A Trust and Unauthorized Operation Based RBAC (TUORBAC) Model
Citations Over Time
Abstract
This paper introduces trust and unauthorized operation to traditional RBAC model, and proposes a trust and unauthorized operation based RBAC model (TUORBAC model). The model has greatly improved in safety compared to traditional RBAC model. Before user activates the roles, TUORBAC model downgrade the roles of user according to the average severity of user historical unauthorized operation. When the average severity of user historical unauthorized operation is high, we directly downgrade roles of user to the lowest. Otherwise, we calculate the value of trust, and downgrade the roles of user according to the value of trust, finally activate downgrade roles. In addition, the model introduces downgrade roles, which stored downgrade roles of user. If downgrade roles are nonempty, we directly activate downgrade roles without re-judged, which improves the efficiency of the system.
Related Papers
- An Extended Role-Based Access Control Model and Method(2009)
- Research of access control model in multi-domain(2008)
- Model for access control system based on RBAC and GFAC(2008)
- Research and application of role-based access control model in medical system(2013)
- Application of extended role-based access control under the struts framework(2008)