A Hierarchical Virtual Role Assignment for Negotiation-Based RBAC Scheme

In recent years, user populations of applications systems have been extended the challenge of controlling access to resources using security policies have grown. However, the typical access control technologies and schemes are insufficient to cope with such applications that allow accessing services via huge users or groups. Therefore, the hierarchical virtual role assignment for negotiation-based RBAC scheme is proposed in this paper. It could manage not only one resource server or agent, but also multiple resources servers or agents on the same time via negotiating and supporting by lots of multiple cooperation resources servers or agents. Moreover, it provides an establishment of the efficient user hierarchy structure which allows huge users in a hierarchy will be a highly powerful solution. Therefore, the innovative research and design of the hierarchical virtual role assignment for negotiation-based RBAC (Role-based Access Control) scheme is proposed in this paper, which focus on easily designing the hierarchy role assignment scheme with both extendable and flexible for RBAC model.

[1]  Chu-Hsing Lin,et al.  Hierarchical key assignment without public-key cryptography , 2001, Comput. Secur..

[2]  Hsing-Chung Chen,et al.  A trusted user-to-role and role-to-key access control scheme , 2015, Soft Computing.

[3]  Chien-Erh Weng,et al.  Cognitive RBAC in mobile heterogeneous networks , 2013, Comput. Sci. Inf. Syst..

[4]  Shiuh-Jeng Wang,et al.  A Cryptographic Key Assignment Scheme with Adaptable Time- token Constraint in a Hierarchy , 2008 .

[5]  Shiuh-Jeng Wang,et al.  Role-based proactive scheme in an access control hierarchy , 2007 .

[6]  Hsing-Chung Chen,et al.  A cognitive RBAC model with handover functions in small heterogeneous networks , 2013, Math. Comput. Model..

[7]  Hsing-Chung Chen,et al.  A mobile location-based with time-constraint RBAC associated database management model , 2012, Comput. Syst. Sci. Eng..

[8]  Hsing-Chung Chen,et al.  A Role-Based RSA Key Management Approach in a Hierarchy Scheme , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[9]  Shiuh-Jeng Wang,et al.  A Generalized Temporal and Spatial Role-Based Access Control Model , 2010, J. Networks.

[10]  Hsing-Chung Chen A Negotiated Virtual Role Solution in RBAC Scheme for Group-Based Heterogeneous Wireless Networks , 2015, 2015 18th International Conference on Network-Based Information Systems.

[11]  Hsing-Chung Chen,et al.  Contract RBAC in cloud computing , 2013, The Journal of Supercomputing.