Hierarchical role-based access control development
Prikladnaâ diskretnaâ matematika, no. 3 (2012), pp. 70-76.

Voir la notice de l'article provenant de la source Math-Net.Ru

A new access control model is proposed. It is obtained by the addition of entity hierarchy and attributes to a RBAC model. The attributes in it are used for specification of the allowed access rights of subjects to entities in a semilattice based access control system.
Keywords: security models, role-based access control, RBAC model, hierarchy of entities.
@article{PDM_2012_3_a7,
     author = {D. N. Kolegov},
     title = {Hierarchical role-based access control development},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {70--76},
     publisher = {mathdoc},
     number = {3},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2012_3_a7/}
}
TY  - JOUR
AU  - D. N. Kolegov
TI  - Hierarchical role-based access control development
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2012
SP  - 70
EP  - 76
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2012_3_a7/
LA  - ru
ID  - PDM_2012_3_a7
ER  - 
%0 Journal Article
%A D. N. Kolegov
%T Hierarchical role-based access control development
%J Prikladnaâ diskretnaâ matematika
%D 2012
%P 70-76
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2012_3_a7/
%G ru
%F PDM_2012_3_a7
D. N. Kolegov. Hierarchical role-based access control development. Prikladnaâ diskretnaâ matematika, no. 3 (2012), pp. 70-76. http://geodesic.mathdoc.fr/item/PDM_2012_3_a7/

[1] National Institute of Standards and Technology. Role Based Access Control (RBAC) and Role Based Security, [Elektronnyi resurs]. Rezhim dostupa: http://csrc.nist.gov/groups/SNS/rbac

[2] Ferraiolo D. F., Kuhn D. R., “Role Based Access Controls”, Proc. 15th National Computer Security Conference (Baltimore, October 1992), 554–563

[3] Sandhu R. S., Coyne E. J., Feinstein H. L., Youman C. E., “Role-Based Access Control Models”, IEEE Computer., 29:2 (1996), 38–47 | DOI

[4] Devyanin P. N., Modeli bezopasnosti kompyuternykh sistem. Upravlenie dostupom i informatsionnymi potokami, Ucheb. posobie dlya vuzov, Goryachaya liniya-Telekom, M., 2011, 320 pp.

[5] Kuhn D. R., Coyne E. J., Weil T. R., “Adding attributes to role-based access control”, IEEE Computer., 43:6 (2010), 79–81 | DOI

[6] Sandhu R. S., Al-Kahtani M. A., “A Model for Attribute-Based User-Role Assignment”, Proc. 18th Annual Computer Security Applications Conference, ACSAC' 02 (Las Vegas, December 09–13, 2002), 353

[7] Joshi J., Bertino E. A., Latif U., Ghafoor A., “A Generalized Temporal Role-Based Access Control Model”, IEEE Trans. Knowledge and Data Engineering, 17:1 (2005), 4–23 | DOI

[8] Bertion E., Catania B., Damiani M. L., “GEO-RBAC: A Spatially Aware RBAC”, Proc. 10th ACM Symposium on Access Control Models and Technologies, SACMAT' 05 (Stockholm, Sweeden, June 2005), 29–37

[9] Thomas R. K., “Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments”, Proc. Second ACM Workshop on Role-based Access Control, RBAC' 97 (Fairfax, Virginia, USA, November 1997), 13–19

[10] Devyanin P. N., “Formirovanie slovarya terminov teorii modelirovaniya bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh”, Prikladnaya diskretnaya matematika, 2011, no. 2, 17–39