Access control to resources using ontological models in intelligent enterprise
DOI:
https://doi.org/10.15587/2312-8372.2014.21701Keywords:
access control, ontological model, business process modeling, intelligent enterpriseAbstract
This article discusses the problem of controlling access to resources of intelligent enterprise using ontology. The main purpose is to develop methods of knowledge representation, that are used in access control and methods of their use. In this paper we propose to represent knowledge in the form of ontological models. The task of access control is performed in the context of a larger system, of ontological business process modeling. The usage of ontological modeling methods allows, when compared to known access control methods RBAC and ABAC, to realize dynamic, well documented access rights granting and withdrawing in context of currently executed business processes. The results of research can be used for implementation of effective access control system in intelligent enterprise. Proposed access control method, which uses the ontological models of knowledge, allows to simplify access control process and improve overall system security.References
- Quinn, J. The intelligent enterprise a new paradigm [Text]/ J. Quinn // Academy of Management Executive. – 2005. – vol. 19, no. 4. – P. 109–121.
- Ferraiolo, D. Role-based access control [Text] / D. Ferraiolo, D. R. Kuhn, R. Chandramouli. – Artech House Publishers, 1992. – P. 405.
- Beyond Roles: A Practical Approach to Enterprise User Provisioning. [Electronic resource]. – Available at: www/ URL: http://www.idsynch.com/ docs/beyond-roles.html. – 10 January 2014. – Title from the screen.
- Karp, A. From ABAC to ZBAC : The Evolution of Access Control Models [Text] / A. Karp, H. Haury, M. Davis // Control. – April 2009. – P. 22–30.
- Sandhu, R Usage Control : A Vision for Next Generation Access Control [Text]/ R. Sandhu, J. Park // Control. – 2003. – vol. 2776. – P. 17–31.
- Zhu, J. Attribute Based Access Control and Security for Collaboration environments [Text]/ J. Zhu // Proc. W.W. Aerospace and Electronics conference NAECON 2008. – P.31-35.
- Park, J Towards usage control models: beyond traditional access control [Text]/ J. Park, R. Sandhu // Proceedings of the seventh ACM symposium on Access control models and technologies SACMAT 02. – 2002. – P. 57–64.
- Kulkarni, D. Context-aware role-based access control in pervasive computing systems [Text]/ D. Kulkarni, A. Tripathi // Proc. 13th ACM Symp. Access Control Model. Technol. SACMAT 08. – 2008. – P. 113.
- Priebe, T Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies [Text] / T. Priebe, W. Dobmeier, C. Schläger, N. Kamprath // J. Software. – 2007. – vol. 2, no. 1. – P. 27–38.
- Thomas, R. K. Conceptual Foundations for a Model of Task-based Authorizations [Text] / R. K. Thomas, R. S. Sandhu // Proceedings of the 7th IEEE Computer Security Foundations Workshop. – 1994. – vol. 39, no. 1. – P. 66- 79.
- Quinn, J. B. (2005). The intelligent enterprise - a new paradigm. Academy of Management Executive, vol. 19, no. 4, 109–121.
- Ferraiolo, D., Kuhn, D. R., Chandramouli, R. (1992). Role-based access control. Artech House Publishers, 405.
- Beyond Roles: A Practical Approach to Enterprise User Provisioning. Available: http://www.idsynch.com/docs/beyond-roles.html. Last accessed 10 January 2014.
- Karp, A. H., Haury, H., Davis, M. H. (April 2009). From ABAC to ZBAC: The Evolution of Access Control Models. Control, 22–30.
- Sandhu, R., Park, J. (2003). Usage Control: A Vision for Next Generation Access Control. Control, vol. 2776, 17–31.
- Zhu, J. (2008). Attribute Based Access Control and Security for Collaboration environments. Proc. W.W. Aerospace and Electronics conference NAECON 2008, 31-35.
- Park, J., Sandhu, R. (2002). Towards usage control models: beyond traditional access control. Proceedings of the seventh ACM symposium on Access control models and technologies SACMAT 02, 57–64.
- Kulkarni, D., Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. Proc. 13th ACM Symp. Access Control Model. Technol. SACMAT 08, 113.
- Priebe, T., Dobmeier, W., Schläger, C., Kamprath, N. (2007). Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies. J. Softw., vol. 2, no. 1, 27–38.
- Thomas, R. K., Sandhu, R. S. (1994). Conceptual Foundations for a Model of Task-based Authorizations. Proceedings of the 7th IEEE Computer Security Foundations Workshop, vol. 39, no. 1, 66-79.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 Yevhen Burov
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.