On the homonymous role in role-based discretionary access control

Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao Hwa Chen, Jiangchuan Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Secure model is a core aspect in trusted information system and a key research field of trusted computing. Based on the extensive research of the Role Based Access Control (RBAC) model and the security operating system standards, we put forward the concept of homonymous role, which extends the control categories of the role in RBAC, balances the control granularity and the storage space requirement, and carries the detailed access control into execution. Based on the homonymous role, we also facilitate the homonymous control domain capability in the Discretionary Access Control (DAC) system. Finally, we design and implement our homonymous control domain on FreeBSD to enhance the flexibility of the access control.

Original languageEnglish
Title of host publicationAutonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PublisherSpringer Verlag
Pages313-322
Number of pages10
ISBN (Print)9783540735465
DOIs
Publication statusPublished - 2007 Jan 1
Event4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007 - Hong Kong, China
Duration: 2007 Jul 112011 Jul 13

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4610 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
Country/TerritoryChina
CityHong Kong
Period07-07-1111-07-13

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'On the homonymous role in role-based discretionary access control'. Together they form a unique fingerprint.

Cite this