A role-involved purpose-based access control model

被引:41
作者
Kabir, Md Enamul [1 ]
Wang, Hua [1 ]
Bertino, Elisa [2 ,3 ]
机构
[1] Univ So Queensland, Dept Math & Comp, Toowoomba, Qld 4350, Australia
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
关键词
Access control; Conditional purpose; Privacy;
D O I
10.1007/s10796-011-9305-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a role-involved purpose-based access control (RPAC) model, where a conditional purpose is defined as the intention of data accesses or usages under certain conditions. RPAC allows users using some data for a certain purpose with Conditions (For instance, Tony agrees that his income information can be used for marketing purposes by removing his name). The structure of RPAC model is investigated after defining access purposes, intended purposes and conditional purposes. An algorithm is developed with role-based access control (RBAC) to achieve the compliance computation between access purposes (related to data access) and intended purposes (related to data objects). Access purpose authorization and authentication in the RPAC model are studied with the hierarchical purpose structure. According to the model, more information from data providers can be extracted while at the same time assuring privacy that maximizes the usability of consumers' data. It extends role-based access control models to a further coverage of privacy preservation in database management systems by adopting purposes and conditional intended purposes and to achieve a fine-grained access control. The work in this paper helps enterprises to circulate a clear privacy promise, and to collect and manage user preferences and consent.
引用
收藏
页码:809 / 822
页数:14
相关论文
共 28 条
  • [1] Agrawal R, 2005, PROC INT CONF DATA, P1013
  • [2] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
  • [3] Al-Fedaghi SabahS., 2007, ADC '07: Proceedings of the Eighteenth Australasian Database Conference, P23
  • [4] [Anonymous], PLATF PRIV PREF P3P
  • [5] [Anonymous], 2005, 3 ANN C PRIV SEC TRU
  • [6] Barker S., 2003, ACM Transactions on Information and Systems Security, V6, P501, DOI 10.1145/950191.950194
  • [7] DATABASE-SECURITY - RESEARCH AND PRACTICE
    BERTINO, E
    JAJODIA, S
    SAMARATI, P
    [J]. INFORMATION SYSTEMS, 1995, 20 (07) : 537 - 556
  • [8] Purpose based access control for privacy protection in relational database systems
    Byun, Ji-Won
    Li, Ninghui
    [J]. VLDB JOURNAL, 2008, 17 (04) : 603 - 619
  • [9] Modelling access policies using roles in requirements engineering
    Crook, R
    Ince, D
    Nuseibeh, B
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2003, 45 (14) : 979 - 991
  • [10] Farzad F., 2007, ANAIS WER 2007 WORKS, P207