• Journal of Internet Computing and Services
    ISSN 2287 - 1136 (Online) / ISSN 1598 - 0170 (Print)
    https://jics.or.kr/

Role Graph Security Management Model based on Lattice


Eun-Bok Choi, Ju-Gi Park, Jae-Hoon Kim, Journal of Internet Computing and Services, Vol. 7, No. 5, pp. 109-122, Oct. 2006
Full Text:
Keywords: MAC, Lattice, RBAC, Role Graph, access control

Abstract

In this paper, we suggest lattice based role graph security management model which changes security level in mandatory access control model as well as constraint and role hierarchy systematically in role base access control model. In this model, we solved privilege abuse of senior role that is role graph model's problem, and when produce conflict between privileges, we can keep integrity of information by reseting grade of subject through constraint. Also, we offer strong security function by doing to be controlled by subject's security level as well as privilege inheritance by role hierarchy, Finally, we present the role graph algorithms with logic to disallow roles that contain conflicting privileges.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[APA Style]
Choi, E., Park, J., & Kim, J. (2006). Role Graph Security Management Model based on Lattice. Journal of Internet Computing and Services, 7(5), 109-122.

[IEEE Style]
E. Choi, J. Park, J. Kim, "Role Graph Security Management Model based on Lattice," Journal of Internet Computing and Services, vol. 7, no. 5, pp. 109-122, 2006.

[ACM Style]
Eun-Bok Choi, Ju-Gi Park, and Jae-Hoon Kim. 2006. Role Graph Security Management Model based on Lattice. Journal of Internet Computing and Services, 7, 5, (2006), 109-122.