HOME JOURNALS CONTACT

Information Technology Journal

Year: 2009 | Volume: 8 | Issue: 5 | Page No.: 726-734
DOI: 10.3923/itj.2009.726.734
Security Policy Management for Systems Employing Role Based Access Control Model
Chao Huang, Jianling Sun, Xinyu Wang and Yuanjie Si

Abstract: In this study, we propose the redundancy and inconsistency checking algorithms to support the policy management of systems employing role based access control model. Present method is based on the formal definition of the policy redundancy and policy inconsistency. Via constructing the role graph, we analyze the redundancy and inconsistency one by one. According to the features of each type of redundancy and inconsistency, present algorithm checks all the possible violations and generates the related policy elements to help the security administrator to amend the policy afterwards. The performance test demonstrates that the approach is efficient enough for practical usage. Present approach could guarantee the conciseness as well as consistency of the access control policy, at same time reduce the burden of access control administration significantly.

Fulltext PDF Fulltext HTML

How to cite this article
Chao Huang, Jianling Sun, Xinyu Wang and Yuanjie Si, 2009. Security Policy Management for Systems Employing Role Based Access Control Model. Information Technology Journal, 8: 726-734.

© Science Alert. All Rights Reserved