Exploring user-to-role delegation in role-based access control
Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarch...
Main Author: | |
---|---|
Format: | Others |
Language: | en |
Published: |
University of Ottawa (Canada)
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10393/27411 http://dx.doi.org/10.20381/ruor-12070 |
id |
ndltd-uottawa.ca-oai-ruor.uottawa.ca-10393-27411 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-uottawa.ca-oai-ruor.uottawa.ca-10393-274112018-01-05T19:07:32Z Exploring user-to-role delegation in role-based access control Qiu, Wei Computer Science. Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature, including Role-Based Access Control Model (RBAC96), Role-Based Delegation Model (RBDM0), Attribute-Based Delegation Model (ABDM), Role-Based Delegation Model 2000 (RDM2000) and Permission-Based Delegation Model (PBDM). The main work of this thesis presents a flexible conceptual delegation model called User-to-Role Delegation Model (URDM), which is based on RDM2000. URDM supports role hierarchy, single-step delegation and simultaneous delegation by introducing a new delegation relation. Four situations are addressed when URDM is involved. We also implement a web application named University Delegation Management System (UDMS) for URDM. At the end of the thesis, we make some generalizations to the area of role-based delegation in access control and present directions for future research. 2013-11-07T18:14:05Z 2013-11-07T18:14:05Z 2006 2006 Thesis Source: Masters Abstracts International, Volume: 45-05, page: 2530. http://hdl.handle.net/10393/27411 http://dx.doi.org/10.20381/ruor-12070 en 100 p. University of Ottawa (Canada) |
collection |
NDLTD |
language |
en |
format |
Others
|
sources |
NDLTD |
topic |
Computer Science. |
spellingShingle |
Computer Science. Qiu, Wei Exploring user-to-role delegation in role-based access control |
description |
Mechanisms must be provided to protect resources from attackers when users request access to resources in network environments. Role-Based Access Control (RBAC) formulates that access decisions are based on the roles that individual users have as members of a system. In RBAC, there are role hierarchies in which a senior role inherits the permissions of a junior role. In order to allow a junior role to perform one or more tasks of a senior role, various delegation models have been proposed in the literature, including Role-Based Access Control Model (RBAC96), Role-Based Delegation Model (RBDM0), Attribute-Based Delegation Model (ABDM), Role-Based Delegation Model 2000 (RDM2000) and Permission-Based Delegation Model (PBDM).
The main work of this thesis presents a flexible conceptual delegation model called User-to-Role Delegation Model (URDM), which is based on RDM2000. URDM supports role hierarchy, single-step delegation and simultaneous delegation by introducing a new delegation relation. Four situations are addressed when URDM is involved. We also implement a web application named University Delegation Management System (UDMS) for URDM.
At the end of the thesis, we make some generalizations to the area of role-based delegation in access control and present directions for future research. |
author |
Qiu, Wei |
author_facet |
Qiu, Wei |
author_sort |
Qiu, Wei |
title |
Exploring user-to-role delegation in role-based access control |
title_short |
Exploring user-to-role delegation in role-based access control |
title_full |
Exploring user-to-role delegation in role-based access control |
title_fullStr |
Exploring user-to-role delegation in role-based access control |
title_full_unstemmed |
Exploring user-to-role delegation in role-based access control |
title_sort |
exploring user-to-role delegation in role-based access control |
publisher |
University of Ottawa (Canada) |
publishDate |
2013 |
url |
http://hdl.handle.net/10393/27411 http://dx.doi.org/10.20381/ruor-12070 |
work_keys_str_mv |
AT qiuwei exploringusertoroledelegationinrolebasedaccesscontrol |
_version_ |
1718602271289245696 |