On the homonymous role in role-based discretionary access control

Kai Ouyang*, Xiaowen CHU, Yixin Jiang, Hsiao Hwa Chen, Jiangchuan Liu

*Corresponding author for this work

Research output: Chapter in book/report/conference proceedingConference proceedingpeer-review

1 Citation (Scopus)

Abstract

Secure model is a core aspect in trusted information system and a key research field of trusted computing. Based on the extensive research of the Role Based Access Control (RBAC) model and the security operating system standards, we put forward the concept of homonymous role, which extends the control categories of the role in RBAC, balances the control granularity and the storage space requirement, and carries the detailed access control into execution. Based on the homonymous role, we also facilitate the homonymous control domain capability in the Discretionary Access Control (DAC) system. Finally, we design and implement our homonymous control domain on FreeBSD to enhance the flexibility of the access control.

Original languageEnglish
Title of host publicationAutonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PublisherSpringer Verlag
Pages313-322
Number of pages10
ISBN (Print)9783540735465
DOIs
Publication statusPublished - 2007
Event4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007 - Hong Kong, China
Duration: 11 Jul 200713 Jul 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4610 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
Country/TerritoryChina
CityHong Kong
Period11/07/0713/07/11

Scopus Subject Areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'On the homonymous role in role-based discretionary access control'. Together they form a unique fingerprint.

Cite this