2020
DOI: 10.1088/1742-6596/1575/1/012060
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Privilege Escalation Based on Hierarchical RBAC Model

Abstract: As access control policies become more and more complex, the detection of access control vulnerabilities becomes more important. Previous research efforts have concentrated on access control vulnerabilities due to programming errors, while the privilege escalation caused by logic errors or abuse of privileges has seldom attracted researchers’ attention, which is also a kind of access control vulnerabilities. To investigate the property of privilege escalation, hierarchical RBAC model is used to describe comple… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Given that a user may use more than one identity, there is a need to share the same basic information for their multiple identities while providing permission isolation between these identities [6] . For example, user Zhang is a resident and staff in community A, and also serves as a grid-charger in community B. Zhang does not want to copy the same basic information to all the three systems for staff, grid-chargers, and residents, nor does he want to query any relevant information of community A when serving as a grid-charger of community B.…”
Section: Identity Switchmentioning
confidence: 99%
“…Given that a user may use more than one identity, there is a need to share the same basic information for their multiple identities while providing permission isolation between these identities [6] . For example, user Zhang is a resident and staff in community A, and also serves as a grid-charger in community B. Zhang does not want to copy the same basic information to all the three systems for staff, grid-chargers, and residents, nor does he want to query any relevant information of community A when serving as a grid-charger of community B.…”
Section: Identity Switchmentioning
confidence: 99%