Extended Role Based Access Control and Procedural Restrictions

0Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The current scheme of access control judges the legality of each access based on immediate information without considering associate information hidden in a series of accesses. Due to the limitation, access control systems do not efficiently limit attacks consist of allowed operations. For trusted operating system developments, we extended RBAC and added procedural constraints to refuse those attacks. With the procedural constraints, the access control of trusted operating systems can discriminate attack trials from normal behaviors. Also, extended RBAC keeps the principle of least privilege and separation of duty more precisely. This paper shows the specification of the extended concept and model, and presents simple analysis results. © Springer-Verlag 2004 References.

Cite

CITATION STYLE

APA

Shin, W., Lee, D. I., Kim, H. C., Kang, J. M., & Lee, J. S. (2004). Extended Role Based Access Control and Procedural Restrictions. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2971, 184–196. https://doi.org/10.1007/978-3-540-24691-6_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free