skip to main content
10.5555/1082161.1082169dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cscConference Proceedingsconference-collections
Article
Free Access

Authorization algorithms for the mobility of user-role relationship

Authors Info & Claims
Published:01 January 2005Publication History

ABSTRACT

The mobility of user-role relationship is a new feature relative to their counterparts in user-role assignments. When an administrative role assigns a role to a user with a mobile membership, this allows the user to use the permissions of the role and to be further added other roles by administrators. Immobile membership grants the user the authority to use the permissions, but does not make the user eligible for further role assignment. Two types of problems may arise in user-role assignment with the mobility of user-role relationship. One is related to authorization granting process. When a role is granted to a user, this role may be conflict with other roles of the user or together with this role; the user may have or derive a high level of authority. Another is related to authorization revocation. When a role is revoked from a user, the user may still have the role from other roles.In this paper, we discuss granting and revocation models related to mobile and immobile memberships between users and roles, then provide proposed authorization granting, weak revocation and strong revocation algorithms that are based on relational algebra and operations. We also describe how to use the new algorithms with an anonymity scalable payment scheme. Finally, comparisons with other related work are made.

References

  1. Barkley J. F., Beznosov K. and Uppal J. (1999), Supporting relationships in access control using role based access control, in 'Third ACM Workshop on RoleBased Access Control', pp. 55--65.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bertino E., Castano S., Ferrari E. and Mesiti M. (2000), 'Specifying and enforcing access control policies for XML document sources', World Wide Web, 3 pp. 139--151.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David F. F., Dennis M. G. and Nickilyn L. (1993), An examination of federal and commercial access control policy needs, in 'NIST NCSC National Computer Security Conference', Baltimore, MD, pp. 107--116.]]Google ScholarGoogle Scholar
  4. Feinstein H. L. (1995), Final report: Nist small business innovative research (sbir) grant: role based access control: phase 1. technical report, in 'SETA Corp.'.]]Google ScholarGoogle Scholar
  5. Ferraiolo D. F. and Kuhn D. R. (1992), Role based access control, in '15th National Computer Security Conference', http: //www.citeseer.nj.nec.com/, pp. 554--563.]]Google ScholarGoogle Scholar
  6. Ferraiolo D. F., Barkley J. F. and Kuhn D. R. (1999), Role-based access control model and reference implementation within a corporate intranet, in 'TISSEC, Vol. 2, pp. 34--64.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Oh S. and Sandhu R. (2002), A model for role administration using organization structure, in 'Seventh ACM Symposium on Access Control Models and Technologies', ACM Press, pp. 155--162.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Okamoto T. (1995), An efficient divisible electronic cash scheme, in 'Advances in Cryptology-Crypto'95', Vol. 963 of Lectures Notes in Computer Science, Springer-Verlag, pp. 438--451.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Rivest R. T. (1992), 'The MD5 message digest algorithm', Internet RFC 1321 .]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sandhu R. (1998a), Role activation hierarchies, in 'Third ACM Workshop on RoleBased Access Control', ACM Press, pp. 33--40.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Sandhu R. (1998b), 'Role-Based Access Control', Advances in Computers46.]]Google ScholarGoogle ScholarCross RefCross Ref
  12. Sandhu R. and Bhamidipati V. (North-Holland, 1997), 'The ura97 model for role-based administration of user-role assignment', T. Y. Lin and Xiao Qian, editors, Database Security XI: Status and Prospects pp. 262--275.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Sandhu R. and Munawer Q. (1999), The arbac99 model for administration of roles, in 'the Annual Computer Security Applications Conference', ACM Press, pp. 229--238.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sandhu R. and Park J. S. (1998), Decentralized User-Role Assignment for Web-based Intranets, in '3th ACM Workshop on Role-Based Access Control', ACM Press, pp. 1--12.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Wang H., Cao J. and Kambayashi Y. (2002), Building a consumer anonymity scalable payment protocol for the internet purchases, in '12th International Workshop on Research Issues on Data Engineering: Engineering E-Commerce/E-Business Systems', San Jose, USA.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Wang H., Cao J. and Zhang Y. (2002), Formal authorization allocation approaches for role-based access control based on relational algebra operations, in '3nd International Conference on Web Information Systems Engineering (WISE02)', Singapore, pp. 301--312.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Wang H. Sun L., Cao J., and Zhang Y. (2004), Anonymous access scheme for electronic-services, in 'Proceedings of the Twenty-Seventh Australasian Computer Science Conference (ACSC2004)', Dunedin, New Zealand, pp. 296--305.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Wang H., Zhang Y., Cao J., Kambayahsi Y. (2004), 'A global ticket-based access scheme for mobile users', Special Issue on Object-Oriented Client/Server Internet Environments, Information Systems Frontiers6(1), 35--46.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Wang H., Zhang Y., Cao J., Varadharajan V. (2003), 'Achieving secure and flexible m-services through tickets', IEEE Transactions on Systems, Man, and Cybernetics, Part A, Special issue on M-Services pp. 697--708.]]Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Yiannis T. (1998), Fair off-line cash made easy, in 'Advances in Cryptology-Asiacrypt'98', Vol. 1346 of Lectures Notes in Computer Science, Springer-Verlag, pp. 240--252.]]Google ScholarGoogle Scholar

Index Terms

  1. Authorization algorithms for the mobility of user-role relationship

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image DL Hosted proceedings
                ACSC '05: Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
                January 2005
                365 pages
                ISBN:1920682201

                Publisher

                Australian Computer Society, Inc.

                Australia

                Publication History

                • Published: 1 January 2005

                Qualifiers

                • Article

                Acceptance Rates

                Overall Acceptance Rate136of379submissions,36%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader