Role Based Access Control Models - ia Tech ppt课件.ppt


文档分类:医学/心理学 | 页数:约18页 举报非法文档有奖
1/18
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/18
文档列表 文档介绍
Role Based Access Control Models
Presented By
Ankit Shah
2nd Year Master’s Student
Problems
Mandatory Access Control (MAC)
Central authority determines access control
Discretionary Access Control (DAC)
Decentralized
Access control decisions lie with the owner of an object
Access control on a per user basis
Access control needs are unique
Existing products lack flexibility
Solution
Role Based Access Control
Permission associated with roles and users assigned to appropriate roles
anization style
Competency
Authority and responsibility
Duty assignments
- Security administration and review
- Simple role-permission relationship
- Ability to meet the changing needs of anization
Role related concepts
What is the difference between roles and groups?
User – permission distinction
Eg. Unix operating system
RBAC is policy neutral but supports
Least privilege
Separation of duties
Data Abstraction
Four Reference Models
Base Model (RBAC0)
User
Typically a human being
Role
Job title
Permission
Approval of a mode of access to some object
Variety of permissions from coarse grain to fine grain
Depends on implementation details of the system
Session
Mapping of one user to many roles
Multiple sessions
Each session may map single or multiple roles of the users subset
RBAC Models
Role Hierarchies (RBAC1)
Reflects anization’s role structure
Supports inheritance of permissions
Hierarchies are a partial order
Useful to limit scope of inheritance
Private roles
Role Hierarchy Examples
Role Hierarchy Examples Continued

Role Based Access Control Models - ia Tech ppt课件 来自淘豆网m.daumloan.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数18
  • 收藏数0 收藏
  • 顶次数0
  • 上传人薄荷牛奶
  • 文件大小0 KB
  • 时间2015-12-05