Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
4636578 | Applied Mathematics and Computation | 2007 | 6 Pages |
Abstract
Role-based access control (RBAC) is arguably the most fundamental and most pervasive security mechanism in use today. RBAC shows up in virtually all systems and imposes great architectural and administrative challenges at all levels of enterprise computing. For efficient and simple management, we map RBAC onto multiple-attractor cellular automata (MACA). Separation of Duty (SoD) constraint and role delegations can be easily demonstrated in MACA based on pseudo-exhaustive (PE)-bit patterns. We also show how conflicts between specified SoD constraints and delegation activities can be resolved by PE-bit patterns. Thus we expect that our methodology can be effectively used for granting strategy in complex automatic system.
Related Topics
Physical Sciences and Engineering
Mathematics
Applied Mathematics
Authors
Jun-Cheol Jeon, Kee Young Yoo,