DocumentCode :
2510469
Title :
A Fuzzy RBAC Model Described by XML-Graph
Author :
Tian, Jia ; Guo, He ; Wang, Yu-Xin ; Wang, Zheng
Author_Institution :
Dept. of Comput. Sci. & Technol., Dalian Univ. of Technol., Dalian, China
fYear :
2009
fDate :
25-27 Sept. 2009
Firstpage :
154
Lastpage :
159
Abstract :
Due to the rapid increasing of system users, it is becoming a tiresome task for the administrator to assign roles and maintain permissions in traditional RBAC model. In order to simplify the administrator´s work and standardize security strategy, human´s fuzzy decision-making capability is required. In this paper, an optimized RBAC model based on fuzzy theory is proposed. Bitmap matrix is used for computing role´s trustworthiness(RT); Variance is applied to adjust attribute weight vector to improve max-min operation´s limitation; Similar users are clustered to share group experience to improve the accuracy of the model; Historical and mutually exclusive permission table for each user is enforced to implement fuzzy RBAC model with separation of duty constraint. Experimental results demonstrate that the optimized model has greater accuracy and avoids the invalidation under special conditions. Additionally, aiming at the limitation of role inheritance and constraint in traditional XML-described RBAC model, a new XML-graph method is introduced. In this method, multi-inheritance is implemented by referencing attributes and private permission is protected by private inheritance. Using XML-graph to describe the improved fuzzy RBAC model, access control strategy can be easily deployed in different systems and the model´s application range is largely expanded.
Keywords :
XML; authorisation; decision making; fuzzy set theory; minimax techniques; Bitmap matrix; XML graph method; duty constraint separation; fuzzy RBAC model; historical exclusive permission table; human fuzzy decision making capability; max-min operation limitation improvement; multi-inheritance method; optimized RBAC model; role based access control strategy; role trustworthiness; security strategy standardization; Access control; Decision making; Embedded computing; Fuzzy control; Fuzzy systems; Helium; Permission; Protection; Security; XML; Bitmap Matrix; Fuzzy; RBAC; XML-graph; clustering; separation of duty;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Scalable Computing and Communications; Eighth International Conference on Embedded Computing, 2009. SCALCOM-EMBEDDEDCOM'09. International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-0-7695-3825-9
Type :
conf
DOI :
10.1109/EmbeddedCom-ScalCom.2009.36
Filename :
5341567
Link To Document :
بازگشت