A Study on Role-Based Access Control Modeling in Public Key Infrastructure

공개키 안에서 Role-Based 접근제어 모델링에 관한 연구

  • 방극인 (조선대학교 컴퓨터공학과) ;
  • 이준 (조선대학교 컴퓨터공학과)
  • Published : 2002.08.01

Abstract

According as practical use of server system is generalized in multimedia and internet environment, the security of all data that is stored to system is actuality that security mechanism of high level such as competence grant or access control is required. Also, standardization of informations that is stored in system in scattered environment protection technology of more complicated system by absence of done schema, non-systemicity etc. Therefore in this paper. General access control way explained basic modeling because enough investigate and analyze general access control way. And assigning role about each modules separating module of RBAC(Role-Based Access Control) modeling, existent access control modeling and RBAC modeling using mixing new access control modeling present.

멀티미디어, 인터넷 환경에서 서버 시스템의 활용이 일반화됨에 따라, 시스템에 저장된 모든 자료의 보안을 위한 권한 부여나 접근 제어와 같은 상위 수준의 보안 메카니즘이 요구되는 현실이다. 또한 분산 환경에서는 시스템내에 저장된 정보들의 정형화된 스키마의 부재, 비체계성 등으로 인하여 보다 복잡한 체계의 보호기술이 필요하게 되었다. 본 논문에서는 일반적인 접근제어 방식을 고찰, 분석하고 기본적인 모델링을 정리하여 설명하였고, RBAC(Role-Based Access Control) 모델링의 모듈들을 분리하고 각 모듈들에 대한 역할을 할당한 후, 기존의 접근제어 모델링과 RBAC 모델링을 혼합 사용하여 새로운 접근제어 모델링을 제시한다.

Keywords

References

  1. Jing-Jang, Kou-Chen and Duen-Ren, 'Access control with role attribute certificates', Computer Standards & Interfaces, Vol. 22, pp.47-48, 2000
  2. Edward C. Cheng, 'An object-oriented organizational model to support dynamic role-based access control in electronic commerce', Decision Support Systems, Vol. 29, Issue 4, pp.362-363, 2000
  3. Reinhardt A. Botha and Jan H. P. Eloff, 'Access Control in Document-centric Workflow Systems An Agent-based Approach', Computers & Security, Vol. 20, Issue 6, pp.529-530, 2001
  4. L. Labuschagne and J. H. P. Eloff, 'Improved system-access control using complementary technologies', Computers & Security, Vol. 16, Issue 6, pp.545-547, 1997
  5. Rayford B. Vaughn, Ronda Henning and Kevin Fox, 'An empirical study of industrial security-engineering practices', Journal of Systems and Software, Vol. 61, Issue 3, pp.227, 2001
  6. Sharman Lichtenstein, 'Information Security Design Principles for Adaptive Organizations', Computer Audit Update, Issue 6, pp.8-9, 1996
  7. 정원혁, "Microsoft SQL Server", 대림출판사, pp.480-492, 2001
  8. Chu-Hsing Lin, 'Dynamic key management schemes for access control in a hierarchy', Computer Communications, Vol. 20, Issue 15, pp.338, 2000 https://doi.org/10.1016/S0140-3664(97)00020-0
  9. Ahmed Patel, 'Access control mechanisms in digital library services', Computer Standards & Interfaces, Vol. 23, Issue 1, pp.21-22, 2001
  10. Marie A. Wright, 'An Overview of PKI', Computers & Security, Vol. 15, Issue 4, pp.515-516, 1999