Authorization algorithms for permission-role assignments

Sun, Lili and Wang, Hua and Yong, Jianming (2009) Authorization algorithms for permission-role assignments. Journal of Universal Computer Science, 15 (9). pp. 1782-1796. ISSN 0948-695X

PDF (Published Version)

Download (155kB)


Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments. However, problems may arise during the procedures of PRA. Conflicting permissions may assign to one role, and as a result, the role with the permissions can derive unexpected access capabilities. This paper aims to analyze the problems during the procedures of permission-role assignments in distributed collaborative environments and to develop authorization allocation algorithms to address the problems within permission-role assignments. The algorithms are extended to the case of PRA with the mobility of permission-role relationship. Finally, comparisons with other related work are discussed to demonstrate the effective work of the paper.

Statistics for USQ ePrint 5647
Statistics for this ePrint Item
Item Type: Article (Commonwealth Reporting Category C)
Refereed: Yes
Item Status: Live Archive
Additional Information: Copyright Permission from Publisher website: ... in the interest of the scientific publication process, the Author agrees to replace the pre-print by a pdf version of the final published version of the article and state the complete bibliographical reference (volume, issue and page number) and the appropriate URL after the article has been published in J.UCS.
Faculty/School / Institute/Centre: Historic - Faculty of Business - School of Information Systems (1 Apr 2007 - 31 Dec 2010)
Faculty/School / Institute/Centre: Historic - Faculty of Business - School of Information Systems (1 Apr 2007 - 31 Dec 2010)
Date Deposited: 03 Feb 2010 12:59
Last Modified: 02 Jul 2013 23:23
Uncontrolled Keywords: access control; authorization; conflicts
Fields of Research (2008): 08 Information and Computing Sciences > 0899 Other Information and Computing Sciences > 089999 Information and Computing Sciences not elsewhere classified
08 Information and Computing Sciences > 0802 Computation Theory and Mathematics > 080201 Analysis of Algorithms and Complexity
08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
Socio-Economic Objectives (2008): E Expanding Knowledge > 97 Expanding Knowledge > 970108 Expanding Knowledge in the Information and Computing Sciences
Identification Number or DOI:

Actions (login required)

View Item Archive Repository Staff Only