{"title":"Analysis and application of environment-aware access control model","authors":"Lijun Dong, Xiaojun Kang, Jun Song","doi":"10.1109/CYBERC.2009.5342194","DOIUrl":null,"url":null,"abstract":"Traditionally access control models focus on access decisions by the static attributes such as identities, group names, memberships, and so on. Some dynamic outside environment factors are ignored. In this paper, we introduce the EAAC model which extends traditional RBAC to include the notion of both environments and behaviors by introducing a new conception that embodies the dynamic environmental factors. The basic analysis and application of EAAC is discussed in this paper. We bring forward a formalized tool based on Petri net, by which an instance of our prototype is analyzed.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CYBERC.2009.5342194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Traditionally access control models focus on access decisions by the static attributes such as identities, group names, memberships, and so on. Some dynamic outside environment factors are ignored. In this paper, we introduce the EAAC model which extends traditional RBAC to include the notion of both environments and behaviors by introducing a new conception that embodies the dynamic environmental factors. The basic analysis and application of EAAC is discussed in this paper. We bring forward a formalized tool based on Petri net, by which an instance of our prototype is analyzed.