Severity Level of Permissions in Role-Based Access Control

12/29/2018
by   S. V. Belim, et al.
0

The analysis of hidden channels of information leakage with respect to role-based access control includes monitoring of excessive permissions among users. It is not always possible to completely eliminate redundancy. The problem of ranking permissions arises in order to identify the most significant, for which redundancy is most not desirable. A numerical characteristic that reflects the value or importance of permissions is called the "severity level". A number of heuristic assumptions have been formulated that make it possible to establish the dependence of the severity level of permissions on the structure of the role hierarchy. A methodology for solving the problem is proposed, using analytic hierarchy process and taking into account these assumptions. The main idea is that the decision tree of the process will be the role graph.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/20/2018

User Authorization in a System with a Role-Based Access Control on the Basis of the Analytic Hierarchy Process

The problem of optimal authorization of a user in a system with a role-b...
research
12/23/2018

The Equivalent Conversions of the Role-Based Access Control Model

The problems which are important for the effective functioning of an acc...
research
03/14/2019

Implementation of Frequency-Severity Association in BMS Ratemaking

A Bonus-Malus System (BMS) in insurance is a premium adjustment mechanis...
research
09/18/2021

Development of patients triage algorithm from nationwide COVID-19 registry data based on machine learning

Prompt severity assessment model of confirmed patients who were infected...
research
09/02/2021

Log severity levels matter: A multivocal mapping

The choice of log severity level can be challenging and cause problems i...
research
12/20/2021

An Investigation into Inconsistency of Software Vulnerability Severity across Data Sources

Software Vulnerability (SV) severity assessment is a vital task for info...
research
01/29/2022

Dissimilar Redundancy in DeFi

The meteoric rise of Decentralized Finance (DeFi) has been accompanied b...

Please sign up or login with your details

Forgot password? Click here to reset