Severity Level of Permissions in Role-Based Access Control
The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The analysis of hidden channels of information leakage with respect to
role-based access control includes monitoring of excessive permissions among
users. It is not always possible to completely eliminate redundancy. The
problem of ranking permissions arises in order to identify the most
significant, for which redundancy is most not desirable. A numerical
characteristic that reflects the value or importance of permissions is called
the "severity level". A number of heuristic assumptions have been formulated
that make it possible to establish the dependence of the severity level of
permissions on the structure of the role hierarchy. A methodology for solving
the problem is proposed, using analytic hierarchy process and taking into
account these assumptions. The main idea is that the decision tree of the
process will be the role graph. |
---|---|
DOI: | 10.48550/arxiv.1812.11404 |