By Topic

An Extended RBAC Model for the Threshold in Collaborative Environment

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Chen Juan-juan ; Dept. of Comput. Eng., Naval Univ. of Eng., Wuhan, China ; Cheng Xi-jun

In collaborative environment the threshold structure is common for joint authorization. Although with the powerful ability to enforce security policies, traditional RBAC hardly considers the issue. In order to solve the problem, we describe the threshold permission as a 3-tuple (obj, op, thre), which is distinguished from ordinary permission. Although there are many users who are assigned to the threshold permission, at least thre different users are required to execute jointly the threshold permission. We propose an efficient algorithm to check whether users can execute the threshold permission. We also analyses the influence of userspsila differences impacting on threshold permissions. At last, we discuss how to constraint threshold permissions and associated roles to enforce separation-of-duty which is a fundamental security principle.

Published in:

Information and Computing Science, 2009. ICIC '09. Second International Conference on  (Volume:1 )

Date of Conference:

21-22 May 2009