Role-based Trust Management Model in Multi-domain Environment
Based on the in-depth analysis of issues in dRBAC model, which include the lack of commission depth control in distributed environment, the inefficiency of cascading revocation of the authorization roles and the incapability of judging whether the commission violates the principles of RBAC model bef...
Saved in:
Main Authors: | , , , |
---|---|
Format: | EJournal Article |
Published: |
Institute of Advanced Engineering and Science,
2012-01-10.
|
Subjects: | |
Online Access: | Get fulltext |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01937 am a22003013u 4500 | ||
---|---|---|---|
001 | ijeecs1981_821 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Guo, Xianchen |e author |
100 | 1 | 0 | |e contributor |
700 | 1 | 0 | |a Zheng, Jun |e author |
700 | 1 | 0 | |a Zhang, Qikun |e author |
700 | 1 | 0 | |a Liu, Hongchang |e author |
245 | 0 | 0 | |a Role-based Trust Management Model in Multi-domain Environment |
260 | |b Institute of Advanced Engineering and Science, |c 2012-01-10. | ||
520 | |a Based on the in-depth analysis of issues in dRBAC model, which include the lack of commission depth control in distributed environment, the inefficiency of cascading revocation of the authorization roles and the incapability of judging whether the commission violates the principles of RBAC model before it is done, this paper proposed MD-dRBAC Model, designed trust management mechanism for MD-dRBAC Model, which was used to control the access, established the credible authority commission tree and finally proposed the detection algorithm for implicit authorities upgrading to avoid violation of the least privilege principle in RBAC model Extensive security and performance analysis show that the proposed schemes are highly efficient and secure. DOI: http://dx.doi.org/10.11591/telkomnika.v11i1.1917 | ||
540 | |a Copyright (c) 2013 Institute of Advanced Engineering and Science | ||
540 | |a http://creativecommons.org/licenses/by-nc-nd/4.0 | ||
546 | |a eng | ||
690 | |||
655 | 7 | |a info:eu-repo/semantics/article |2 local | |
655 | 7 | |a info:eu-repo/semantics/publishedVersion |2 local | |
655 | 7 | |2 local | |
786 | 0 | |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 11, No 1: January 2013; 417-424 | |
786 | 0 | |n 2502-4760 | |
786 | 0 | |n 2502-4752 | |
786 | 0 | |n 10.11591/ijeecs.v11.i1 | |
787 | 0 | |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1981/821 | |
856 | 4 | 1 | |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1981/821 |z Get fulltext |