Using π-Calculus to Formalize Domain Administration of RBAC View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2006

AUTHORS

Yahui Lu , Li Zhang , Yinbo Liu , Jiaguang Sun

ABSTRACT

With the wide implementations of Role-based access control (RBAC) models in the information systems, the access control for RBAC itself, administration of RBAC, becomes more and more important. In this paper, we propose a Domain Administration of RBAC Model, DARBAC, which defines an administrative domain for each administrative role. The administrative role can execute administrative operations on the users, roles, objects and child administrative roles within its administrative domain. Then we use π-calculus to formalize the elements of DARBAC model and their interactions. Although π-calculus has been successfully used in many security areas such as protocol analysis and information flow analysis, as we have known, our approach is the first attempt to use π-calculus to formalize RBAC and its administrative model. More... »

PAGES

278-289

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11689522_26

DOI

http://dx.doi.org/10.1007/11689522_26

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1023065953


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information Systems", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "School of Software, Tsinghua University, 100084, Beijing, China", 
            "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Lu", 
        "givenName": "Yahui", 
        "id": "sg:person.011616200146.46", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011616200146.46"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Software, Tsinghua University, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "School of Software, Tsinghua University, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhang", 
        "givenName": "Li", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "School of Software, Tsinghua University, 100084, Beijing, China", 
            "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Liu", 
        "givenName": "Yinbo", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "School of Software, Tsinghua University, 100084, Beijing, China", 
            "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sun", 
        "givenName": "Jiaguang", 
        "id": "sg:person.011411464635.59", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011411464635.59"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2006", 
    "datePublishedReg": "2006-01-01", 
    "description": "With the wide implementations of Role-based access control (RBAC) models in the information systems, the access control for RBAC itself, administration of RBAC, becomes more and more important. In this paper, we propose a Domain Administration of RBAC Model, DARBAC, which defines an administrative domain for each administrative role. The administrative role can execute administrative operations on the users, roles, objects and child administrative roles within its administrative domain. Then we use \u03c0-calculus to formalize the elements of DARBAC model and their interactions. Although \u03c0-calculus has been successfully used in many security areas such as protocol analysis and information flow analysis, as we have known, our approach is the first attempt to use \u03c0-calculus to formalize RBAC and its administrative model.", 
    "editor": [
      {
        "familyName": "Chen", 
        "givenName": "Kefei", 
        "type": "Person"
      }, 
      {
        "familyName": "Deng", 
        "givenName": "Robert", 
        "type": "Person"
      }, 
      {
        "familyName": "Lai", 
        "givenName": "Xuejia", 
        "type": "Person"
      }, 
      {
        "familyName": "Zhou", 
        "givenName": "Jianying", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11689522_26", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-540-33052-3", 
        "978-3-540-33058-5"
      ], 
      "name": "Information Security Practice and Experience", 
      "type": "Book"
    }, 
    "keywords": [
      "administrative domains", 
      "role-based access control model", 
      "domain administration", 
      "access control model", 
      "administration of RBAC", 
      "information flow analysis", 
      "access control", 
      "RBAC model", 
      "security area", 
      "RBAC", 
      "information systems", 
      "control model", 
      "administrative operations", 
      "administrative model", 
      "administrative roles", 
      "users", 
      "flow analysis", 
      "calculus", 
      "protocol analysis", 
      "implementation", 
      "objects", 
      "domain", 
      "first attempt", 
      "model", 
      "wider implementation", 
      "operation", 
      "system", 
      "analysis", 
      "elements", 
      "control", 
      "area", 
      "attempt", 
      "interaction", 
      "role", 
      "administration", 
      "paper", 
      "approach", 
      "DARBAC", 
      "child administrative roles", 
      "DARBAC model"
    ], 
    "name": "Using \u03c0-Calculus to Formalize Domain Administration of RBAC", 
    "pagination": "278-289", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1023065953"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11689522_26"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11689522_26", 
      "https://app.dimensions.ai/details/publication/pub.1023065953"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:11", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_194.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11689522_26"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11689522_26'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11689522_26'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11689522_26'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11689522_26'


 

This table displays all metadata directly associated to this object as RDF triples.

136 TRIPLES      23 PREDICATES      66 URIs      59 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11689522_26 schema:about anzsrc-for:08
2 anzsrc-for:0806
3 schema:author N88d7b043d85648bb8d3c728d6dfcf665
4 schema:datePublished 2006
5 schema:datePublishedReg 2006-01-01
6 schema:description With the wide implementations of Role-based access control (RBAC) models in the information systems, the access control for RBAC itself, administration of RBAC, becomes more and more important. In this paper, we propose a Domain Administration of RBAC Model, DARBAC, which defines an administrative domain for each administrative role. The administrative role can execute administrative operations on the users, roles, objects and child administrative roles within its administrative domain. Then we use π-calculus to formalize the elements of DARBAC model and their interactions. Although π-calculus has been successfully used in many security areas such as protocol analysis and information flow analysis, as we have known, our approach is the first attempt to use π-calculus to formalize RBAC and its administrative model.
7 schema:editor N9a86e3a9a48245c7b55a4522036d3e65
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Nd0b9d2cb4e09437f91071002a8e56801
12 schema:keywords DARBAC
13 DARBAC model
14 RBAC
15 RBAC model
16 access control
17 access control model
18 administration
19 administration of RBAC
20 administrative domains
21 administrative model
22 administrative operations
23 administrative roles
24 analysis
25 approach
26 area
27 attempt
28 calculus
29 child administrative roles
30 control
31 control model
32 domain
33 domain administration
34 elements
35 first attempt
36 flow analysis
37 implementation
38 information flow analysis
39 information systems
40 interaction
41 model
42 objects
43 operation
44 paper
45 protocol analysis
46 role
47 role-based access control model
48 security area
49 system
50 users
51 wider implementation
52 schema:name Using π-Calculus to Formalize Domain Administration of RBAC
53 schema:pagination 278-289
54 schema:productId Nb3544468420242d1b6051a589afecb4c
55 Need4a06653f4438b8b8d116bf88b2a3f
56 schema:publisher Nafb8b18e51f043b192462068a8cf5a94
57 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023065953
58 https://doi.org/10.1007/11689522_26
59 schema:sdDatePublished 2022-01-01T19:11
60 schema:sdLicense https://scigraph.springernature.com/explorer/license/
61 schema:sdPublisher N5a50f025713d439eaf9154f979bd5e6b
62 schema:url https://doi.org/10.1007/11689522_26
63 sgo:license sg:explorer/license/
64 sgo:sdDataset chapters
65 rdf:type schema:Chapter
66 N0d934362ad4a42039833b128655640f2 schema:familyName Deng
67 schema:givenName Robert
68 rdf:type schema:Person
69 N48002dce80664b90abd08143c2da2cca rdf:first sg:person.011411464635.59
70 rdf:rest rdf:nil
71 N49e16da1d5034ec8b05b77d63fb0f631 schema:affiliation grid-institutes:grid.12527.33
72 schema:familyName Zhang
73 schema:givenName Li
74 rdf:type schema:Person
75 N556327dcdb404f84952ee817759a0881 rdf:first N49e16da1d5034ec8b05b77d63fb0f631
76 rdf:rest Nb3342a9ed3a1410fb018b63f75e08bc6
77 N588c4e1909d04b9f84b3ab483347326b schema:familyName Chen
78 schema:givenName Kefei
79 rdf:type schema:Person
80 N5a50f025713d439eaf9154f979bd5e6b schema:name Springer Nature - SN SciGraph project
81 rdf:type schema:Organization
82 N6226ce9078e24fddbc54ef1b9eec4d7c schema:familyName Lai
83 schema:givenName Xuejia
84 rdf:type schema:Person
85 N7359682fbdc246db9fa76af0ac6c6558 rdf:first Nd09cad26d6414580a17abc8f5182900e
86 rdf:rest rdf:nil
87 N88d7b043d85648bb8d3c728d6dfcf665 rdf:first sg:person.011616200146.46
88 rdf:rest N556327dcdb404f84952ee817759a0881
89 N931df5587ca748c9b5d320c933f5761c schema:affiliation grid-institutes:grid.12527.33
90 schema:familyName Liu
91 schema:givenName Yinbo
92 rdf:type schema:Person
93 N9a86e3a9a48245c7b55a4522036d3e65 rdf:first N588c4e1909d04b9f84b3ab483347326b
94 rdf:rest Nd62e124656564e569bc509457ddc18c6
95 Nafb8b18e51f043b192462068a8cf5a94 schema:name Springer Nature
96 rdf:type schema:Organisation
97 Nb3342a9ed3a1410fb018b63f75e08bc6 rdf:first N931df5587ca748c9b5d320c933f5761c
98 rdf:rest N48002dce80664b90abd08143c2da2cca
99 Nb3544468420242d1b6051a589afecb4c schema:name doi
100 schema:value 10.1007/11689522_26
101 rdf:type schema:PropertyValue
102 Nb5802a57cc9e470ab4b2060c2d04c5d7 rdf:first N6226ce9078e24fddbc54ef1b9eec4d7c
103 rdf:rest N7359682fbdc246db9fa76af0ac6c6558
104 Nd09cad26d6414580a17abc8f5182900e schema:familyName Zhou
105 schema:givenName Jianying
106 rdf:type schema:Person
107 Nd0b9d2cb4e09437f91071002a8e56801 schema:isbn 978-3-540-33052-3
108 978-3-540-33058-5
109 schema:name Information Security Practice and Experience
110 rdf:type schema:Book
111 Nd62e124656564e569bc509457ddc18c6 rdf:first N0d934362ad4a42039833b128655640f2
112 rdf:rest Nb5802a57cc9e470ab4b2060c2d04c5d7
113 Need4a06653f4438b8b8d116bf88b2a3f schema:name dimensions_id
114 schema:value pub.1023065953
115 rdf:type schema:PropertyValue
116 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
117 schema:name Information and Computing Sciences
118 rdf:type schema:DefinedTerm
119 anzsrc-for:0806 schema:inDefinedTermSet anzsrc-for:
120 schema:name Information Systems
121 rdf:type schema:DefinedTerm
122 sg:person.011411464635.59 schema:affiliation grid-institutes:grid.12527.33
123 schema:familyName Sun
124 schema:givenName Jiaguang
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011411464635.59
126 rdf:type schema:Person
127 sg:person.011616200146.46 schema:affiliation grid-institutes:grid.12527.33
128 schema:familyName Lu
129 schema:givenName Yahui
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011616200146.46
131 rdf:type schema:Person
132 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China
133 School of Software, Tsinghua University, 100084, Beijing, China
134 schema:name Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China
135 School of Software, Tsinghua University, 100084, Beijing, China
136 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...