A Role - Based Access Control Mechanism using Z language in Distributed System


The KIPS Transactions:PartC, Vol. 8, No. 2, pp. 113-121, Apr. 2001
10.3745/KIPSTC.2001.8.2.113,   PDF Download:

Abstract

The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control (RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, we present the interworking Biba and RBAC model to protect the user from modifying the information in an unauthorized way while providing the flexible permission management facility. And internetworking access control model with constraints help both the policy designer and programmers to understand and implement programs. It may also save the cost and time for network managed systems. Also, the proposed model is demonstrated on real network management systems. From this demonstration, the preservation of information integrity are confirmed.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
B. N. Noh and E. B. Choi, "A Role - Based Access Control Mechanism using Z language in Distributed System," The KIPS Transactions:PartC, vol. 8, no. 2, pp. 113-121, 2001. DOI: 10.3745/KIPSTC.2001.8.2.113.

[ACM Style]
Bong Nam Noh and Eun Bok Choi. 2001. A Role - Based Access Control Mechanism using Z language in Distributed System. The KIPS Transactions:PartC, 8, 2, (2001), 113-121. DOI: 10.3745/KIPSTC.2001.8.2.113.