Article ID Journal Published Year Pages File Type
4636578 Applied Mathematics and Computation 2007 6 Pages PDF
Abstract
Role-based access control (RBAC) is arguably the most fundamental and most pervasive security mechanism in use today. RBAC shows up in virtually all systems and imposes great architectural and administrative challenges at all levels of enterprise computing. For efficient and simple management, we map RBAC onto multiple-attractor cellular automata (MACA). Separation of Duty (SoD) constraint and role delegations can be easily demonstrated in MACA based on pseudo-exhaustive (PE)-bit patterns. We also show how conflicts between specified SoD constraints and delegation activities can be resolved by PE-bit patterns. Thus we expect that our methodology can be effectively used for granting strategy in complex automatic system.
Related Topics
Physical Sciences and Engineering Mathematics Applied Mathematics
Authors
, ,