Severity Level of Permissions in Role-Based Access Control

The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Belim, S. V, Bogachenko, N. F, Kabanov, A. N
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Belim, S. V
Bogachenko, N. F
Kabanov, A. N
description The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant, for which redundancy is most not desirable. A numerical characteristic that reflects the value or importance of permissions is called the "severity level". A number of heuristic assumptions have been formulated that make it possible to establish the dependence of the severity level of permissions on the structure of the role hierarchy. A methodology for solving the problem is proposed, using analytic hierarchy process and taking into account these assumptions. The main idea is that the decision tree of the process will be the role graph.
doi_str_mv 10.48550/arxiv.1812.11404
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1812_11404</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1812_11404</sourcerecordid><originalsourceid>FETCH-LOGICAL-a674-7ba2164a835238952e43f2f0bd205ab880376955ee40832465e8879e8dac96b73</originalsourceid><addsrcrecordid>eNotj8tqwzAQRbXJoiT9gK6qH7Crt8bZpaYvMCSk2ZuxPQaBYwUphObv26Zdnbs63MPYgxSlAWvFE6avcCklSFVKaYS5Y-tPulAK5ytvfsbE48h3lI4h5xDnzMPM93Gi4hkzDXzT95Qzr-N8TnFascWIU6b7fy7Z4fXlUL8Xzfbto940BTpvCt-hks4gaKs0VFaR0aMaRTcoYbEDENq7yloiI0Ar4ywB-IpgwL5ynddL9vinvZ1vTykcMV3b34j2FqG_AZOgP_U</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Severity Level of Permissions in Role-Based Access Control</title><source>arXiv.org</source><creator>Belim, S. V ; Bogachenko, N. F ; Kabanov, A. N</creator><creatorcontrib>Belim, S. V ; Bogachenko, N. F ; Kabanov, A. N</creatorcontrib><description>The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant, for which redundancy is most not desirable. A numerical characteristic that reflects the value or importance of permissions is called the "severity level". A number of heuristic assumptions have been formulated that make it possible to establish the dependence of the severity level of permissions on the structure of the role hierarchy. A methodology for solving the problem is proposed, using analytic hierarchy process and taking into account these assumptions. The main idea is that the decision tree of the process will be the role graph.</description><identifier>DOI: 10.48550/arxiv.1812.11404</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2018-12</creationdate><rights>http://creativecommons.org/publicdomain/zero/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,780,885</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1812.11404$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1812.11404$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Belim, S. V</creatorcontrib><creatorcontrib>Bogachenko, N. F</creatorcontrib><creatorcontrib>Kabanov, A. N</creatorcontrib><title>Severity Level of Permissions in Role-Based Access Control</title><description>The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant, for which redundancy is most not desirable. A numerical characteristic that reflects the value or importance of permissions is called the "severity level". A number of heuristic assumptions have been formulated that make it possible to establish the dependence of the severity level of permissions on the structure of the role hierarchy. A methodology for solving the problem is proposed, using analytic hierarchy process and taking into account these assumptions. The main idea is that the decision tree of the process will be the role graph.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2018</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNotj8tqwzAQRbXJoiT9gK6qH7Crt8bZpaYvMCSk2ZuxPQaBYwUphObv26Zdnbs63MPYgxSlAWvFE6avcCklSFVKaYS5Y-tPulAK5ytvfsbE48h3lI4h5xDnzMPM93Gi4hkzDXzT95Qzr-N8TnFascWIU6b7fy7Z4fXlUL8Xzfbto940BTpvCt-hks4gaKs0VFaR0aMaRTcoYbEDENq7yloiI0Ar4ywB-IpgwL5ynddL9vinvZ1vTykcMV3b34j2FqG_AZOgP_U</recordid><startdate>20181229</startdate><enddate>20181229</enddate><creator>Belim, S. V</creator><creator>Bogachenko, N. F</creator><creator>Kabanov, A. N</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20181229</creationdate><title>Severity Level of Permissions in Role-Based Access Control</title><author>Belim, S. V ; Bogachenko, N. F ; Kabanov, A. N</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a674-7ba2164a835238952e43f2f0bd205ab880376955ee40832465e8879e8dac96b73</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2018</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Belim, S. V</creatorcontrib><creatorcontrib>Bogachenko, N. F</creatorcontrib><creatorcontrib>Kabanov, A. N</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Belim, S. V</au><au>Bogachenko, N. F</au><au>Kabanov, A. N</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Severity Level of Permissions in Role-Based Access Control</atitle><date>2018-12-29</date><risdate>2018</risdate><abstract>The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant, for which redundancy is most not desirable. A numerical characteristic that reflects the value or importance of permissions is called the "severity level". A number of heuristic assumptions have been formulated that make it possible to establish the dependence of the severity level of permissions on the structure of the role hierarchy. A methodology for solving the problem is proposed, using analytic hierarchy process and taking into account these assumptions. The main idea is that the decision tree of the process will be the role graph.</abstract><doi>10.48550/arxiv.1812.11404</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1812.11404
ispartof
issn
language eng
recordid cdi_arxiv_primary_1812_11404
source arXiv.org
subjects Computer Science - Cryptography and Security
title Severity Level of Permissions in Role-Based Access Control
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T05%3A57%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Severity%20Level%20of%20Permissions%20in%20Role-Based%20Access%20Control&rft.au=Belim,%20S.%20V&rft.date=2018-12-29&rft_id=info:doi/10.48550/arxiv.1812.11404&rft_dat=%3Carxiv_GOX%3E1812_11404%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true