DESIGN FOR DYNAMIC USER-ROLE-BASED SECURITY

被引:11
作者
MOHAMMED, I
DILTS, DM
机构
[1] UNIV WATERLOO,DEPT MANAGEMENT SCI,WATERLOO,ON N2L 3G1,CANADA
[2] NO TELECOM CANADA LTD,TORONTO,ON,CANADA
关键词
ACTIVE DATABASE SECURITY; USER-ROLE-BASED SECURITY; ACCESS CONTROL;
D O I
10.1016/0167-4048(94)90048-5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preventing the disclosure, modification or destruction of information in a database has been the subject of considerable recent research (see, for example, [1-3]). While mandatory access control (MAC) assigns security clearance levels (e.g. top secret, secret) to all data for access control, discretionary access control (DAC) assigns privileges to users tailored to their responsibilities within an application. Both of these mechanisms have the fundamental limitation that they are unable to deal with the changing roles of a user (based on the occurrence of an event) within an application. As a result, user-role-based security (URBS) has been proposed [4,5]. This paper demonstrates how URBS can be used to augment the existing security mechanisms. First the URBS concept, originally proposed for the object-oriented model, is extended to the relational model. Second, the extended model is augmented with the capability to respond to dynamic events. Finally, an integrated method is presented for the design of a dynamic, user-role-based security system.
引用
收藏
页码:661 / 671
页数:11
相关论文
共 24 条
[1]  
ANDERSON T, 1989, SAFE SECURE COMPUTIN
[2]  
BEKICH Z, 1991, PROGRAMMING COMPUTER, V16, P202
[3]  
Bell D., 1976, SECURE COMPUTER SYST
[4]  
BUNEMAN PO, 1979, ACM T DATABASE SYST, V4, P368
[5]  
DATE CJ, 1990, INTRO DATABASE SYSTE, V1
[6]  
DEMURJIAN SA, 1992, SPECIFICATION METHOD
[7]  
DEMURJIAN SA, 1992, ANAL FRAMEWORK USER
[8]  
DENNING, 1986, P IEEE S SECURITY PR
[9]  
DITTRICH K, 1989, DATABASE SECURITY, V3
[10]  
FERNANDEZ EB, 1981, DATABASE SECURITY IN