Role based access control design using triadic concept analysis

Role based access control is one of the widely used access control models. There are investigations in the literature that use knowledge representation mechanisms such as formal concept analysis (FCA), description logics, and Ontology for representing access control mechanism. However, while using FCA, investigations reported in the literature so far work on the logic that transforms the three dimensional access control matrix into dyadic formal contexts. This transformation is mainly to derive the formal concepts, lattice structure and implications to represent role hierarchy and constraints of RBAC. In this work, we propose a methodology that models RBAC using triadic FCA without transforming the triadic access control matrix into dyadic formal contexts. Our discussion is on two lines of inquiry. We present how triadic FCA can provide a suitable representation of RBAC policy and we demonstrate how this representation follows role hierarchy and constraints of RBAC on sample healthcare network available in the literature.

[1]  R. Wille,et al.  On the modal understanding of triadic contexts , 2000 .

[2]  Yanheng Liu,et al.  Dynamic Policy Access Model Based on Formal Concept Analysis , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[3]  Martin Knechtel,et al.  Access restrictions to and with description logic web ontologies , 2010 .

[4]  Rudolf Wille,et al.  A Triadic Approach to Formal Concept Analysis , 1995, ICCS.

[5]  Lionel C. Briand,et al.  A comprehensive modeling framework for role-based access control policies , 2015, J. Syst. Softw..

[6]  C. Chandrasekar,et al.  Modeling Chinese wall access control using formal concept analysis , 2014, 2014 International Conference on Contemporary Computing and Informatics (IC3I).

[7]  Hongwei Du,et al.  Handling least privilege problem and role mining in RBAC , 2015, J. Comb. Optim..

[8]  Jonas Poelmans,et al.  Formal concept analysis in knowledge processing: A survey on applications , 2013, Expert Syst. Appl..

[9]  Junghwa Chae Modeling of the Role-Based Access Control Policy with Constraints Using Description Logic , 2007, ICCSA.

[10]  Chen Zhao,et al.  Representation and Reasoning on RBAC: A Description Logic Approach , 2005, ICTAC.

[11]  George Voutsadakis,et al.  Polyadic Concept Analysis , 2002, Order.

[12]  Junho Choi,et al.  Ontology-based access control model for security policy reasoning in cloud computing , 2013, The Journal of Supercomputing.

[13]  Ravi S. Sandhu,et al.  The NIST model for role-based access control: towards a unified standard , 2000, RBAC '00.

[14]  Matt Bishop Introduction to Computer Security , 2004 .

[15]  Dmitry I. Ignatov,et al.  Concept Learning from Triadic Data , 2014, ITQM.

[16]  Bernhard Ganter,et al.  Implications in Triadic Formal Contexts , 2004, ICCS.

[17]  Cherukuri Aswani Kumar,et al.  FUZZY CLUSTERING-BASED FORMAL CONCEPT ANALYSIS FOR ASSOCIATION RULES MINING , 2012, Appl. Artif. Intell..

[18]  Jonas Poelmans,et al.  Formal Concept Analysis in knowledge processing: A survey on models and techniques , 2013, Expert Syst. Appl..

[19]  Ch. Aswani Kumar Modeling Access Permissions in Role Based Access Control Using Formal Concept Analysis , 2012 .

[20]  Amedeo Napoli,et al.  Biclustering meets triadic concept analysis , 2013, Annals of Mathematics and Artificial Intelligence.

[21]  Rudolf Wille,et al.  Conceptual Graphs and Formal Concept Analysis , 1997, ICCS.

[22]  Lei Li,et al.  Permission and role automatic assigning of user in role-based access control , 2012 .

[23]  Mohand-Said Hacid,et al.  Secure Data Integration: A Formal Concept Analysis Based Approach , 2014, DEXA.

[24]  Elisa Bertino,et al.  The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.

[25]  Ravi S. Sandhu Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.

[26]  Martin Milanic,et al.  Group irregularity strength of connected graphs , 2015, J. Comb. Optim..

[27]  Sérgio M. Dias,et al.  Knowledge reduction in formal contexts using non-negative matrix factorization , 2015, Math. Comput. Simul..

[28]  Jan H. P. Eloff,et al.  Building access control models with attribute exploration , 2009, Comput. Secur..

[29]  Ravi S. Sandhu,et al.  Lattice-based access control models , 1993, Computer.

[30]  D. Richard Kuhn,et al.  Adding Attributes to Role-Based Access Control , 2010, Computer.

[31]  Edward J. Coyne,et al.  ABAC and RBAC: Scalable, Flexible, and Auditable Access Management , 2013, IT Professional.

[32]  Jan Konecny,et al.  General Approach to Triadic Concept Analysis , 2010, CLA.

[33]  Cherukuri Aswani Kumar,et al.  Three-way conceptual approach for cognitive memory functionalities , 2017, Int. J. Mach. Learn. Cybern..

[34]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[35]  Vadim V. Strijov,et al.  Editorial of the special issue data analysis and intelligent optimization with applications , 2015, Machine Learning.

[36]  C. Chandrasekar,et al.  Inter-domain role based access control using ontology , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[37]  Gerd Stumme,et al.  A Finite State Model for On-Line Analytical Processing in Triadic Contexts , 2005, ICFCA.

[38]  Radim Belohlávek,et al.  Triadic concept lattices of data with graded attributes , 2012, Int. J. Gen. Syst..

[39]  Guillermo Navarro-Arribas,et al.  Fuzzy Role-Based Access Control , 2011, Inf. Process. Lett..

[40]  Jinhai Li,et al.  An information fusion technology for triadic decision contexts , 2016, Int. J. Mach. Learn. Cybern..

[41]  C. Chandrasekar,et al.  Representation of multiple domain role based access control using FCA , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[42]  Bartosz Zieliński,et al.  Modelling role hierarchy structure using the Formal Concept Analysis , 2010, Ann. UMCS Informatica.

[43]  Andreas Hotho,et al.  TRIAS--An Algorithm for Mining Iceberg Tri-Lattices , 2006, Sixth International Conference on Data Mining (ICDM'06).

[44]  Cherukuri Aswani Kumar,et al.  Designing role-based access control using formal concept analysis , 2013, Secur. Commun. Networks.

[45]  Radim Belohlávek,et al.  Triadic Concept Analysis of Data with Fuzzy Attributes , 2010, 2010 IEEE International Conference on Granular Computing.

[46]  Fausto Giunchiglia,et al.  Using Description Logics in Relation Based Access Control , 2009, Description Logics.

[47]  Ch. Aswani Kumar,et al.  Knowledge Representation Using Formal Concept Analysis: A study on Concept Generation , 2014 .

[48]  Chu Kiong Loo,et al.  Formal concept analysis approach to cognitive functionalities of bidirectional associative memory , 2015, BICA 2015.

[49]  Cherukuri Aswani Kumar,et al.  Modeling Fuzzy Role Based Access Control Using Fuzzy Formal Concept Analysis , 2015, SSCC.

[50]  M. Ufuk Çaglayan,et al.  A formal role-based access control model for security policies in multi-domain mobile networks , 2013, Comput. Networks.

[51]  Rudolf Wille,et al.  The Basic Theorem of triadic concept analysis , 1995 .

[52]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[53]  Stéphane Coulondre,et al.  Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs , 2006, ICCS.

[54]  Ch. Aswanikumar,et al.  Concept lattice reduction using fuzzy K-Means clustering , 2010, Expert Syst. Appl..

[55]  Sergei O. Kuznetsov,et al.  Triadic Formal Concept Analysis and triclustering: searching for optimal patterns , 2015, Machine Learning.

[56]  Sooyong Park,et al.  A feature-based approach for modeling role-based access control systems , 2011, J. Syst. Softw..

[57]  Radim Belohlávek,et al.  Triadic fuzzy Galois connections as ordinary connections , 2014, Fuzzy Sets Syst..

[58]  Cynthia Vera Glodeanu Fuzzy-Valued Triadic Implications , 2011, CLA.

[59]  Bernhard Ganter,et al.  Formal Concept Analysis , 2013 .