2011
DOI: 10.1016/j.ipl.2011.02.010
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy Role-Based Access Control

Abstract: RBAC (Role-Based Access Control) is a widely used access control model, which reduces the maintenance cost of classical identitybased access control. However, despite the benefits of RBAC, there are environments in which RBAC can hardly be applied. We present FRBAC (Fuzzy Role-Based Access Control), a generalization of RBAC that fits the requirements of environments where authorization-related information is vague. Moreover, FRBAC deals with environments where the actions that can be executed over the resource… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
7
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 15 publications
(13 reference statements)
0
7
0
Order By: Relevance
“…The concept of "fuzzy" has been introduced to the RBAC for achieving better flexibility in handling exceptional requests [25]. The fuzzy RBAC carried out the more relaxed assignments of user-role and role-permission compared with the original RBAC model.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The concept of "fuzzy" has been introduced to the RBAC for achieving better flexibility in handling exceptional requests [25]. The fuzzy RBAC carried out the more relaxed assignments of user-role and role-permission compared with the original RBAC model.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, the concept of risk and the opposite concept of trust have naturally been introduced as an effective and flexible assistive tool for the authorization decision-making process. For instance, the risk assessment method has already been integrated into classical models like RBAC and multiple levels of security (MLS) [25,26]. By estimating the risk of the certain request based on the specific involving information and comparing the risk with some preset acceptance criteria of risk, these risk-oriented enhanced models have achieved flexible and efficient unattended authorizations for urgent requests which do not comply with the basic access rules in original models.…”
Section: Introductionmentioning
confidence: 99%
“…Non-deterministic access control models could also be considered for implementation of sequences of actions, especially when branches are considered and users can follow any of them. Several of these models exist, of which we emphasize: probabilistic models to determine risk [15][16] [17], cognitive-based systems [18] and fuzzy theory-based models [19] [20]. Ultimately, the SeqBAC model presented here is meant to be deterministic, which would allow security experts to conduct auditing and to keep a level of assurance that no unexpected access decision is made.…”
Section: Related Workmentioning
confidence: 99%
“…They then compared the ontology of similar frameworks [3]. This process considerably reduced the difficulties encountered by cloud service providers.…”
mentioning
confidence: 99%