Access control to resources using ontological models in intelligent enterprise

Authors

  • Yevhen Burov National University "Lviv Polytechnic", str. 12 Bandera, Lviv, Ukraine, 79013, Ukraine

DOI:

https://doi.org/10.15587/2312-8372.2014.21701

Keywords:

access control, ontological model, business process modeling, intelligent enterprise

Abstract

This article discusses the problem of controlling access to resources of intelligent enterprise using ontology. The main purpose is to develop methods of knowledge representation, that are used in access control and methods of their use. In this paper we propose to represent knowledge in the form of ontological models. The task of access control is performed in the context of a larger system, of ontological business process modeling. The usage of ontological modeling methods allows, when compared to known access control methods RBAC and ABAC, to realize dynamic, well documented access rights granting and withdrawing in context of currently executed business processes. The results of research can be used for implementation of effective access control system in intelligent enterprise. Proposed access control method, which uses the ontological models of knowledge, allows to simplify access control process and improve overall system security.

Author Biography

Yevhen Burov, National University "Lviv Polytechnic", str. 12 Bandera, Lviv, Ukraine, 79013

Ph.D., Associate Professor, Professor

Department of Information Systems and Networks

References

  1. Quinn, J. The intelligent enterprise a new paradigm [Text]/ J. Quinn // Academy of Management Executive. – 2005. – vol. 19, no. 4. – P. 109–121.
  2. Ferraiolo, D. Role-based access control [Text] / D. Ferraiolo, D. R. Kuhn, R. Chandramouli. – Artech House Publishers, 1992. – P. 405.
  3. Beyond Roles: A Practical Approach to Enterprise User Provisioning. [Electronic resource]. – Available at: www/ URL: http://www.idsynch.com/ docs/beyond-roles.html. – 10 January 2014. – Title from the screen.
  4. Karp, A. From ABAC to ZBAC : The Evolution of Access Control Models [Text] / A. Karp, H. Haury, M. Davis // Control. – April 2009. – P. 22–30.
  5. Sandhu, R Usage Control : A Vision for Next Generation Access Control [Text]/ R. Sandhu, J. Park // Control. – 2003. – vol. 2776. – P. 17–31.
  6. Zhu, J. Attribute Based Access Control and Security for Collaboration environments [Text]/ J. Zhu // Proc. W.W. Aerospace and Electronics conference NAECON 2008. – P.31-35.
  7. Park, J Towards usage control models: beyond traditional access control [Text]/ J. Park, R. Sandhu // Proceedings of the seventh ACM symposium on Access control models and technologies SACMAT 02. – 2002. – P. 57–64.
  8. Kulkarni, D. Context-aware role-based access control in pervasive computing systems [Text]/ D. Kulkarni, A. Tripathi // Proc. 13th ACM Symp. Access Control Model. Technol. SACMAT 08. – 2008. – P. 113.
  9. Priebe, T Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies [Text] / T. Priebe, W. Dobmeier, C. Schläger, N. Kamprath // J. Software. – 2007. – vol. 2, no. 1. – P. 27–38.
  10. Thomas, R. K. Conceptual Foundations for a Model of Task-based Authorizations [Text] / R. K. Thomas, R. S. Sandhu // Proceedings of the 7th IEEE Computer Security Foundations Workshop. – 1994. – vol. 39, no. 1. – P. 66- 79.
  11. Quinn, J. B. (2005). The intelligent enterprise - a new paradigm. Academy of Management Executive, vol. 19, no. 4, 109–121.
  12. Ferraiolo, D., Kuhn, D. R., Chandramouli, R. (1992). Role-based access control. Artech House Publishers, 405.
  13. Beyond Roles: A Practical Approach to Enterprise User Provisioning. Available: http://www.idsynch.com/docs/beyond-roles.html. Last accessed 10 January 2014.
  14. Karp, A. H., Haury, H., Davis, M. H. (April 2009). From ABAC to ZBAC: The Evolution of Access Control Models. Control, 22–30.
  15. Sandhu, R., Park, J. (2003). Usage Control: A Vision for Next Generation Access Control. Control, vol. 2776, 17–31.
  16. Zhu, J. (2008). Attribute Based Access Control and Security for Collaboration environments. Proc. W.W. Aerospace and Electronics conference NAECON 2008, 31-35.
  17. Park, J., Sandhu, R. (2002). Towards usage control models: beyond traditional access control. Proceedings of the seventh ACM symposium on Access control models and technologies SACMAT 02, 57–64.
  18. Kulkarni, D., Tripathi, A. (2008). Context-aware role-based access control in pervasive computing systems. Proc. 13th ACM Symp. Access Control Model. Technol. SACMAT 08, 113.
  19. Priebe, T., Dobmeier, W., Schläger, C., Kamprath, N. (2007). Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies. J. Softw., vol. 2, no. 1, 27–38.
  20. Thomas, R. K., Sandhu, R. S. (1994). Conceptual Foundations for a Model of Task-based Authorizations. Proceedings of the 7th IEEE Computer Security Foundations Workshop, vol. 39, no. 1, 66-79.

Downloads

Published

2014-02-06

How to Cite

Burov, Y. (2014). Access control to resources using ontological models in intelligent enterprise. Technology Audit and Production Reserves, 1(4(15), 36–38. https://doi.org/10.15587/2312-8372.2014.21701