User Authorization in a System with a Role-Based Access Control on the Basis of the Analytic Hierarchy Process

12/20/2018
by   S. V. Belim, et al.
0

The problem of optimal authorization of a user in a system with a role-based access control policy is considered. The main criterion is to minimize the risks of permission leakage. The choice of the role for authorization is based on the analytic hierarchy process. The substantiation of a choice of criteria for formation of a hierarchy of the first level is given. An algorithm for calculating weight coefficients is presented, based on the quantitative characteristics of the role graph and not dependent on subjective expert evaluations. The complexity is estimated and the scalability of the proposed algorithm is discussed.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/23/2018

The Equivalent Conversions of the Role-Based Access Control Model

The problems which are important for the effective functioning of an acc...
research
12/29/2018

Severity Level of Permissions in Role-Based Access Control

The analysis of hidden channels of information leakage with respect to r...
research
07/05/2019

A comparison of various analytic choice principles

We investigate computability theoretic and descriptive set theoretic con...
research
07/06/2020

A modified axiomatic foundation of the analytic hierarchy process

This paper reports a modified axiomatic foundation of the analytic hiera...
research
12/19/2018

Using the decision support algorithms combining different security policies

During the development of the security subsystem of modern information s...
research
12/19/2012

Role Mining with Probabilistic Models

Role mining tackles the problem of finding a role-based access control (...
research
04/15/2014

An effective AHP-based metaheuristic approach to solve supplier selection problem

The supplier selection problem is based on electing the best supplier fr...

Please sign up or login with your details

Forgot password? Click here to reset