Adding Context into an Access Control Model for Computer Security Policy

Adding Context into an Access Control Model for Computer Security Policy

Shangping Ren, Jeffrey J.P. Tsai, Ophir Frieder
ISBN13: 9781591409410|ISBN10: 1591409411|EISBN13: 9781591409434
DOI: 10.4018/978-1-59140-941-1.ch016
Cite Chapter Cite Chapter

MLA

Ren, Shangping, et al. "Adding Context into an Access Control Model for Computer Security Policy." Advances in Machine Learning Applications in Software Engineering, edited by Du Zhang and Jeffery J.P. Tsai, IGI Global, 2007, pp. 439-456. https://doi.org/10.4018/978-1-59140-941-1.ch016

APA

Ren, S., Tsai, J. J., & Frieder, O. (2007). Adding Context into an Access Control Model for Computer Security Policy. In D. Zhang & J. Tsai (Eds.), Advances in Machine Learning Applications in Software Engineering (pp. 439-456). IGI Global. https://doi.org/10.4018/978-1-59140-941-1.ch016

Chicago

Ren, Shangping, Jeffrey J.P. Tsai, and Ophir Frieder. "Adding Context into an Access Control Model for Computer Security Policy." In Advances in Machine Learning Applications in Software Engineering, edited by Du Zhang and Jeffery J.P. Tsai, 439-456. Hershey, PA: IGI Global, 2007. https://doi.org/10.4018/978-1-59140-941-1.ch016

Export Reference

Mendeley
Favorite

Abstract

In this chapter, we present the role-based context constrained access control (RBCC) model. The model integrates contextual constraints specified in first-order logic with the standard role-based access control (RBAC). In the RBCC access control model, the permission assignment functions are constrained by the user’s current accessing contexts. The accessing contests are further categorized in two classes, that is, system contexts and application contexts. System contexts may contain accessing time, accessing location, and other security-related system information; while application contexts are abstractions of relationships among different types of entities (i.e., subjects, roles, and objects) as well as implicit relationships derived from protected information content and external information. The ability to integrate contextual information allows the RBCC model to be flexible and capable of specifying a variety of complex access policies and providing tight and just-intime permission activations. A set of medical domain examples will be used to demonstrate the expressiveness of the RBCC model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.