DOI: https://doi.org/10.15587/2312-8372.2014.21701

Access control to resources using ontological models in intelligent enterprise

Yevhen Burov

Abstract


This article discusses the problem of controlling access to resources of intelligent enterprise using ontology. The main purpose is to develop methods of knowledge representation, that are used in access control and methods of their use. In this paper we propose to represent knowledge in the form of ontological models. The task of access control is performed in the context of a larger system, of ontological business process modeling. The usage of ontological modeling methods allows, when compared to known access control methods RBAC and ABAC, to realize dynamic, well documented access rights granting and withdrawing in context of currently executed business processes. The results of research can be used for implementation of effective access control system in intelligent enterprise. Proposed access control method, which uses the ontological models of knowledge, allows to simplify access control process and improve overall system security.

Keywords


access control; ontological model; business process modeling; intelligent enterprise

Full Text:

PDF

References


Quinn, J. The intelligent enterprise a new paradigm [Text]/ J. Quinn // Academy of Management Executive. – 2005. – vol. 19, no. 4. – P. 109–121.

Ferraiolo, D. Role-based access control [Text] / D. Ferraiolo, D. R. Kuhn, R. Chandramouli. – Artech House Publishers, 1992. – P. 405.

Beyond Roles: A Practical Approach to Enterprise User Provisioning. [Electronic resource]. – Available at: www/ URL: http://www.idsynch.com/ docs/beyond-roles.html. – 10 January 2014. – Title from the screen.

Karp, A. From ABAC to ZBAC : The Evolution of Access Control Models [Text] / A. Karp, H. Haury, M. Davis // Control. – April 2009. – P. 22–30.

Sandhu, R Usage Control : A Vision for Next Generation Access Control [Text]/ R. Sandhu, J. Park // Control. – 2003. – vol. 2776. – P. 17–31.

Zhu, J. Attribute Based Access Control and Security for Collaboration environments [Text]/ J. Zhu // Proc. W.W. Aerospace and Electronics conference NAECON 2008. – P.31-35.

Park, J Towards usage control models: beyond traditional access control [Text]/ J. Park, R. Sandhu // Proceedings of the seventh ACM symposium on Access control models and technologies SACMAT 02. – 2002. – P. 57–64.

Kulkarni, D. Context-aware role-based access control in pervasive computing systems [Text]/ D. Kulkarni, A. Tripathi // Proc. 13th ACM Symp. Access Control Model. Technol. SACMAT 08. – 2008. – P. 113.

Priebe, T Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies [Text] / T. Priebe, W. Dobmeier, C. Schläger, N. Kamprath // J. Software. – 2007. – vol. 2, no. 1. – P. 27–38.

Thomas, R. K. Conceptual Foundations for a Model of Task-based Authorizations [Text] / R. K. Thomas, R. S. Sandhu // Proceedings of the 7th IEEE Computer Security Foundations Workshop. – 1994. – vol. 39, no. 1. – P. 66- 79.

Quinn, J. B. (2005). The intelligent enterprise - a new paradigm. Academy of Management Executive, vol. 19, no. 4, 109–121.

Ferraiolo, D., Kuhn, D. R., Chandramouli, R. (1992). Role-based access control. Artech House Publishers, 405.

Beyond Roles: A Practical Approach to Enterprise User Provisioning. Available: http://www.idsynch.com/docs/beyond-roles.html. Last accessed 10 January 2014.

Karp, A. H., Haury, H., Davis, M. H. (April 2009). From ABAC to ZBAC: The Evolution of Access Control Models. Control, 22–30.

Sandhu, R., Park, J. (2003). Usage Control: A Vision for Next Generation Access Control. Control, vol. 2776, 17–31.

Zhu, J. (2008). Attribute Based Access Control and Security for Collaboration environments. Proc. W.W. Aerospace and Electronics conference NAECON 2008, 31-35.

Park, J., Sandhu, R. (2002). Towards usage control models: beyond traditional access control. Proceedings of the seventh ACM symposium on Access control models and technologies SACMAT 02, 57–64.

Kulkarni, D., Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. Proc. 13th ACM Symp. Access Control Model. Technol. SACMAT 08, 113.

Priebe, T., Dobmeier, W., Schläger, C., Kamprath, N. (2007). Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies. J. Softw., vol. 2, no. 1, 27–38.

Thomas, R. K., Sandhu, R. S. (1994). Conceptual Foundations for a Model of Task-based Authorizations. Proceedings of the 7th IEEE Computer Security Foundations Workshop, vol. 39, no. 1, 66-79.


GOST Style Citations








Copyright (c) 2016 Yevhen Burov

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN (print) 2664-9969, ISSN (on-line) 2706-5448