Sun, Lili and Wang, Hua and Yong, Jianming (2009) Authorization algorithms for permission-role assignments. Journal of Universal Computer Science, 15 (9). pp. 1782-1796. ISSN 0948-695X
![]()
|
PDF (Published Version)
Sun_Wang_Yong_2009_PV.pdf Download (155kB) |
Abstract
Permission-role assignments (PRA) is one important process in Role-based access control (RBAC) which has been proven to be a flexible and useful access model for information sharing in distributed collaborative environments. However, problems may arise during the procedures of PRA. Conflicting permissions may assign to one role, and as a result, the role with the permissions can derive unexpected access capabilities. This paper aims to analyze the problems during the procedures of permission-role assignments in distributed collaborative environments and to develop authorization allocation algorithms to address the problems within permission-role assignments. The algorithms are extended to the case of PRA with the mobility of permission-role relationship. Finally, comparisons with other related work are discussed to demonstrate the effective work of the paper.
![]() |
Statistics for this ePrint Item |
Item Type: | Article (Commonwealth Reporting Category C) |
---|---|
Refereed: | Yes |
Item Status: | Live Archive |
Additional Information: | Copyright Permission from Publisher website: ... in the interest of the scientific publication process, the Author agrees to replace the pre-print by a pdf version of the final published version of the article and state the complete bibliographical reference (volume, issue and page number) and the appropriate URL after the article has been published in J.UCS. |
Faculty/School / Institute/Centre: | Historic - Faculty of Business - School of Information Systems (1 Apr 2007 - 31 Dec 2010) |
Faculty/School / Institute/Centre: | Historic - Faculty of Business - School of Information Systems (1 Apr 2007 - 31 Dec 2010) |
Date Deposited: | 03 Feb 2010 12:59 |
Last Modified: | 02 Jul 2013 23:23 |
Uncontrolled Keywords: | access control; authorization; conflicts |
Fields of Research (2008): | 08 Information and Computing Sciences > 0899 Other Information and Computing Sciences > 089999 Information and Computing Sciences not elsewhere classified 08 Information and Computing Sciences > 0802 Computation Theory and Mathematics > 080201 Analysis of Algorithms and Complexity 08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security |
Socio-Economic Objectives (2008): | E Expanding Knowledge > 97 Expanding Knowledge > 970108 Expanding Knowledge in the Information and Computing Sciences |
Identification Number or DOI: | https://doi.org/10.3217/jucs-015-09-1782 |
URI: | http://eprints.usq.edu.au/id/eprint/5647 |
Actions (login required)
![]() |
Archive Repository Staff Only |