A Methodology for Bridging between RBAC and an Arbitrary Application Program

  • Authors:
  • Candy Wai-Yue Shum;Sylvia L. Osborn;He Wang

  • Affiliations:
  • Dept. of Computer Science, The University of Western Ontario, London, Canada;Dept. of Computer Science, The University of Western Ontario, London, Canada;Dept. of Computer Science, The University of Western Ontario, London, Canada

  • Venue:
  • SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Role-Based Access Control (RBAC) models have been available since the early 1990s. However, there is no well-understood methodology for using RBAC with an arbitrary application program. We highlight tradeoffs between the ANSI RBAC model and the Role Graph Model, and also enumerate different versions of each. We then discuss alternatives to bridging between an RBAC model and an ad hoc program. An example of the application of one of the alternatives is given.