Skip to main content
Top
Published in: International Journal of Machine Learning and Cybernetics 11/2018

30-06-2018 | Original Article

Role based access control design using three-way formal concept analysis

Authors: Chandra Mouliswaran Subramanian, Aswani Kumar Cherukuri, Chandrasekar Chelliah

Published in: International Journal of Machine Learning and Cybernetics | Issue 11/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Role based access control (RBAC) is one of the popular access control models. On representing the policy behind RBAC, the literatures investigate the use of various knowledge representation techniques such as Descriptive logics, Formal Concept Analysis (FCA), Ontology etc. Based on the input of binary access control table, the existing knowledge representation techniques on RBAC derives two-way decisions whether to permit the access request or not. It works well when single element in the set of elements of a constituent of RBAC initiates the access request. Consider the scenario of multiple distinct elements in the set of elements of a constituent of RBAC initiate the collective access request to a set of elements in other constituent of RBAC. In many cases of this scenario, some elements possess but not all of the elements possess the permission to access all elements in other subset of a constituent of RBAC. On this situation, the collective access decision to those multiple distinct elements in the set of elements of a RBAC constituent appears in three forms such as permit, deny and non-commitment. Three-way formal concept analysis (3WCA) is an emerging knowledge representation technique which provides two types of three-way concepts and their lattices to enable three-way decisions from the binary information table. At this juncture, it is more suitable to apply 3WCA on representing the RBAC policy to enable three-way decisions instead of existing two-way decisions in classical FCA and triadic FCA. The main objective of this paper is to propose a methodology for modelling RBAC using 3WCA and attain its distinctive merits. Our discussion is on two lines of inquiry. We present on how 3WCA can provide suitable representation of RBAC policy and whether this representation follows role hierarchy and constraints of RBAC.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Cherukuri AK, Dias SM, Vieira NJ (2015) Knowledge reduction in formal contexts using non-negative matrix factorization. Math Comput Simul 109:46–63MathSciNetCrossRef Cherukuri AK, Dias SM, Vieira NJ (2015) Knowledge reduction in formal contexts using non-negative matrix factorization. Math Comput Simul 109:46–63MathSciNetCrossRef
2.
go back to reference Chae J (2007) Modeling of the role-based access control policy with constraints using description logic. In: International conference on computational science and its applications. Springer, Berlin Heidelberg, 500–511 Chae J (2007) Modeling of the role-based access control policy with constraints using description logic. In: International conference on computational science and its applications. Springer, Berlin Heidelberg, 500–511
3.
go back to reference Chen L, Crampton J (2007) Inter-domain role mapping and least privilege. In: Proceedings of the 12th ACM symposium on access control models and technologies. ACM, New York, 157–162 Chen L, Crampton J (2007) Inter-domain role mapping and least privilege. In: Proceedings of the 12th ACM symposium on access control models and technologies. ACM, New York, 157–162
4.
go back to reference Choi C, Choi J, Kim P (2014) Ontology-based access control model for security policy reasoning in cloud computing. J Supercomput 67(3):711–722CrossRef Choi C, Choi J, Kim P (2014) Ontology-based access control model for security policy reasoning in cloud computing. J Supercomput 67(3):711–722CrossRef
5.
go back to reference Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):0014–16CrossRef Coyne E, Weil TR (2013) ABAC and RBAC: scalable, flexible, and auditable access management. IT Prof 15(3):0014–16CrossRef
6.
go back to reference Dau F, Knechtel M (2009) Access policy design supported by FCA methods. In: International conference on conceptual structures. Springer, Berlin Heidelberg, 141–154 Dau F, Knechtel M (2009) Access policy design supported by FCA methods. In: International conference on conceptual structures. Springer, Berlin Heidelberg, 141–154
7.
go back to reference Fadhel AB, Bianculli D, Briand L (2015) A comprehensive modeling framework for role-based access control policies. J Syst Softw 107:110–126CrossRef Fadhel AB, Bianculli D, Briand L (2015) A comprehensive modeling framework for role-based access control policies. J Syst Softw 107:110–126CrossRef
8.
go back to reference Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4(3):224–274CrossRef Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4(3):224–274CrossRef
9.
go back to reference Ferreira A, Chadwick D, Farinha P, Correia R, Zao G, Chilro R, Antunes L (2009) How to securely break into RBAC: the BTG-RBAC model. In: Computer security applications conference, 2009. ACSAC’09. Annual. IEEE, Piscataway, 23–31CrossRef Ferreira A, Chadwick D, Farinha P, Correia R, Zao G, Chilro R, Antunes L (2009) How to securely break into RBAC: the BTG-RBAC model. In: Computer security applications conference, 2009. ACSAC’09. Annual. IEEE, Piscataway, 23–31CrossRef
10.
go back to reference Ganter B, Wille R (2012) Formal concept analysis: mathematical foundations. Springer Science & Business Media, New York, (Chap. 1)MATH Ganter B, Wille R (2012) Formal concept analysis: mathematical foundations. Springer Science & Business Media, New York, (Chap. 1)MATH
11.
go back to reference Fujita H, Li T, Yao Y (2016) Advances in three-way decisions and granular computing. Knowl-Based Syst 91:1–3CrossRef Fujita H, Li T, Yao Y (2016) Advances in three-way decisions and granular computing. Knowl-Based Syst 91:1–3CrossRef
12.
go back to reference Huang C, Li J, Mei C, Wu WZ (2017) Three-way concept learning based on cognitive operators: An information fusion viewpoint. Int J Approx Reason 83:218–242MathSciNetCrossRef Huang C, Li J, Mei C, Wu WZ (2017) Three-way concept learning based on cognitive operators: An information fusion viewpoint. Int J Approx Reason 83:218–242MathSciNetCrossRef
13.
go back to reference Kim S, Kim DK, Lu L, Kim S, Park S (2011) A feature-based approach for modeling role-based access control systems. J Syst Softw 84(12):2035–2052CrossRef Kim S, Kim DK, Lu L, Kim S, Park S (2011) A feature-based approach for modeling role-based access control systems. J Syst Softw 84(12):2035–2052CrossRef
14.
go back to reference Knechtel M (2011) Access restrictions to and with description logic web ontologies. Doctoral dissertation, Dresden, Technische Universität Dresden Knechtel M (2011) Access restrictions to and with description logic web ontologies. Doctoral dissertation, Dresden, Technische Universität Dresden
15.
go back to reference Kuhn DR, Coyne EJ, Weil TR (2010) Adding attributes to role-based access control. IEEE Comput 43(6):79–81CrossRef Kuhn DR, Coyne EJ, Weil TR (2010) Adding attributes to role-based access control. IEEE Comput 43(6):79–81CrossRef
16.
go back to reference Kumar CA, Srinivas S (2010) Concept lattice reduction using fuzzy K-means clustering. Expert Syst Appl 37(3):2696–2704CrossRef Kumar CA, Srinivas S (2010) Concept lattice reduction using fuzzy K-means clustering. Expert Syst Appl 37(3):2696–2704CrossRef
17.
go back to reference Kumar CA (2012) Fuzzy clustering-based formal concept analysis for association rules mining. Appl Artif Intell 26(3):274–301CrossRef Kumar CA (2012) Fuzzy clustering-based formal concept analysis for association rules mining. Appl Artif Intell 26(3):274–301CrossRef
18.
go back to reference Kumar CA (2012) Modeling access permissions in role based access control using formal concept analysis. In: Wireless networks and computational intelligence. Springer, Berlin Heidelberg, pp 578–583CrossRef Kumar CA (2012) Modeling access permissions in role based access control using formal concept analysis. In: Wireless networks and computational intelligence. Springer, Berlin Heidelberg, pp 578–583CrossRef
19.
go back to reference Kumar C (2013) Designing role-based access control using formal concept analysis. Secur Commun Netw 6(3):373–383CrossRef Kumar C (2013) Designing role-based access control using formal concept analysis. Secur Commun Netw 6(3):373–383CrossRef
20.
go back to reference Kumar CA, Mouliswaran SC, Li JH, Chandrasekar C (2016) Role based access control design using triadic concept analysis. J Cent South Univ 23(12):3183–3191CrossRef Kumar CA, Mouliswaran SC, Li JH, Chandrasekar C (2016) Role based access control design using triadic concept analysis. J Cent South Univ 23(12):3183–3191CrossRef
22.
go back to reference Lehmann F, Wille R (1995) A triadic approach to formal concept analysis. In: International conference on conceptual structures. Springer, Berlin Heidelberg, 32–43 Lehmann F, Wille R (1995) A triadic approach to formal concept analysis. In: International conference on conceptual structures. Springer, Berlin Heidelberg, 32–43
23.
go back to reference Li J, Huang C, Qi J, Qian Y, Liu W (2017) Three-way cognitive concept learning via multi-granularity. Inf Sci 378:244–263CrossRef Li J, Huang C, Qi J, Qian Y, Liu W (2017) Three-way cognitive concept learning via multi-granularity. Inf Sci 378:244–263CrossRef
24.
go back to reference Li J, Kumar CA, Mei C, Wang X (2017) Comparison of reduction in formal decision contexts. Int J Approx Reason 80:100–122MathSciNetCrossRef Li J, Kumar CA, Mei C, Wang X (2017) Comparison of reduction in formal decision contexts. Int J Approx Reason 80:100–122MathSciNetCrossRef
25.
go back to reference Li J, Mei C, Lv Y (2013) Incomplete decision contexts: approximate concept construction, rule acquisition and knowledge reduction. Int J Approx Reason 54(1):149–165MathSciNetCrossRef Li J, Mei C, Lv Y (2013) Incomplete decision contexts: approximate concept construction, rule acquisition and knowledge reduction. Int J Approx Reason 54(1):149–165MathSciNetCrossRef
26.
go back to reference Li M, Wang G (2016) Approximate concept construction with three-way decisions and attribute reduction in incomplete contexts. Knowl-Based Syst 91:165–178CrossRef Li M, Wang G (2016) Approximate concept construction with three-way decisions and attribute reduction in incomplete contexts. Knowl-Based Syst 91:165–178CrossRef
27.
go back to reference Liu G, Zhang R, Song H, Wang C, Liu J, Liu A (2016) Ts-RBAC: A RBAC model with transformation. Comput Secur 60:52–61CrossRef Liu G, Zhang R, Song H, Wang C, Liu J, Liu A (2016) Ts-RBAC: A RBAC model with transformation. Comput Secur 60:52–61CrossRef
28.
go back to reference Martínez-García C, Navarro-Arribas G, Borrell J (2011) Fuzzy role-based access control. Inf Process Lett 111(10):483–487MathSciNetCrossRef Martínez-García C, Navarro-Arribas G, Borrell J (2011) Fuzzy role-based access control. Inf Process Lett 111(10):483–487MathSciNetCrossRef
29.
go back to reference Mouliswaran SC, Kumar CA, Chandrasekar C (2014) Modeling Chinese wall access control using formal concept analysis. In: Contemporary computing and informatics (IC3I), 2014 international conference on. IEEE, Piscataway, 811–816CrossRef Mouliswaran SC, Kumar CA, Chandrasekar C (2014) Modeling Chinese wall access control using formal concept analysis. In: Contemporary computing and informatics (IC3I), 2014 international conference on. IEEE, Piscataway, 811–816CrossRef
30.
go back to reference Mouliswaran SC, Kumar CA, Chandrasekar C (2015) Representation of multiple domain role based access control using FCA. In: Electrical, computer and communication technologies (ICECCT), 2015 IEEE international conference on. IEEE, Piscataway, 1–6 Mouliswaran SC, Kumar CA, Chandrasekar C (2015) Representation of multiple domain role based access control using FCA. In: Electrical, computer and communication technologies (ICECCT), 2015 IEEE international conference on. IEEE, Piscataway, 1–6
31.
go back to reference Mouliswaran SC, Kumar CA, Chandrasekar C (2015) Inter-domain role based access control using ontology. In: Advances in computing, communications and informatics (ICACCI), 2015 international conference on. IEEE, Piscataway, 2027–2032CrossRef Mouliswaran SC, Kumar CA, Chandrasekar C (2015) Inter-domain role based access control using ontology. In: Advances in computing, communications and informatics (ICACCI), 2015 international conference on. IEEE, Piscataway, 2027–2032CrossRef
33.
go back to reference Obiedkov S, Kourie DG, Eloff JH (2009) Building access control models with attribute exploration. Comput Secur 28(1):2–7CrossRef Obiedkov S, Kourie DG, Eloff JH (2009) Building access control models with attribute exploration. Comput Secur 28(1):2–7CrossRef
34.
go back to reference Poelmans J, Kuznetsov SO, Ignatov DI, Dedene G (2013) Formal concept analysis in knowledge processing: a survey on models and techniques. Expert Syst Appl 40(16):6601–6623CrossRef Poelmans J, Kuznetsov SO, Ignatov DI, Dedene G (2013) Formal concept analysis in knowledge processing: a survey on models and techniques. Expert Syst Appl 40(16):6601–6623CrossRef
35.
go back to reference Qi J, Wei L, Yao Y (2014) Three-way formal concept analysis. In: International conference on rough sets and knowledge technology. Springer International Publishing, New York, 732–741 Qi J, Wei L, Yao Y (2014) Three-way formal concept analysis. In: International conference on rough sets and knowledge technology. Springer International Publishing, New York, 732–741
36.
go back to reference Qi J, Qian T, Wei L (2016) The connections between three-way and classical concept lattices. Knowl-Based Syst 91:143–151CrossRef Qi J, Qian T, Wei L (2016) The connections between three-way and classical concept lattices. Knowl-Based Syst 91:143–151CrossRef
37.
go back to reference Ren R, Wei L (2016) The attribute reductions of three-way concept lattices. Knowl-Based Syst 99:92–102CrossRef Ren R, Wei L (2016) The attribute reductions of three-way concept lattices. Knowl-Based Syst 99:92–102CrossRef
38.
go back to reference Samarati P, de Vimercati SC (2000) Access control: policies, models, and mechanisms. In: International School on Foundations of Security Analysis and Design. Springer, Berlin Heidelberg, pp 137–196 Samarati P, de Vimercati SC (2000) Access control: policies, models, and mechanisms. In: International School on Foundations of Security Analysis and Design. Springer, Berlin Heidelberg, pp 137–196
39.
go back to reference Sandhu RS (1993) Lattice-based access control models. Computer 26(11):9–19CrossRef Sandhu RS (1993) Lattice-based access control models. Computer 26(11):9–19CrossRef
40.
go back to reference Sandhu RS, Coynek EJ, Feinsteink HL, Youmank CE (1996) Role-based access control models. Computer 29(2):38–47CrossRef Sandhu RS, Coynek EJ, Feinsteink HL, Youmank CE (1996) Role-based access control models. Computer 29(2):38–47CrossRef
41.
go back to reference Sellami M, Gammoudi MM, Hacid MS (2014) Secure data integration: a formal concept analysis based approach. In: International conference on database and expert systems applications. Springer International Publishing, New York, 326–333 Sellami M, Gammoudi MM, Hacid MS (2014) Secure data integration: a formal concept analysis based approach. In: International conference on database and expert systems applications. Springer International Publishing, New York, 326–333
42.
go back to reference Shivhare R, Cherukuri AK (2017) Three-way conceptual approach for cognitive memory functionalities. Int J Mach Learn Cybernet 8(1):21–34CrossRef Shivhare R, Cherukuri AK (2017) Three-way conceptual approach for cognitive memory functionalities. Int J Mach Learn Cybernet 8(1):21–34CrossRef
43.
go back to reference Sobieski S, Zielinski B (2010) Modelling role hierarchy structure using the formal concept analysis. Annales Universitatis Mariae Curie-Sklodowska, vol 10, 2. De Gruyter Open Sp. z oo, Warsaw, 143 Sobieski S, Zielinski B (2010) Modelling role hierarchy structure using the formal concept analysis. Annales Universitatis Mariae Curie-Sklodowska, vol 10, 2. De Gruyter Open Sp. z oo, Warsaw, 143
44.
go back to reference Singh PK, Aswani Kumar C, Gani A (2016) A comprehensive survey on formal concept analysis, its research trends and applications. Int J Appl Math Comput Sci 26(2):495–516MathSciNetCrossRef Singh PK, Aswani Kumar C, Gani A (2016) A comprehensive survey on formal concept analysis, its research trends and applications. Int J Appl Math Comput Sci 26(2):495–516MathSciNetCrossRef
45.
go back to reference Staab S, Studer R (eds) (2013) Handbook on ontologies. (2nd edn) Springer Science & Business Media, New York, (Chap. 1)MATH Staab S, Studer R (eds) (2013) Handbook on ontologies. (2nd edn) Springer Science & Business Media, New York, (Chap. 1)MATH
46.
go back to reference Subramanian CM, Cherukuri AK, Chelliah C (2015) Modeling fuzzy role based access control using fuzzy formal concept analysis. In: International symposium on security in computing and communication. Springer International Publishing, New York, 176–185CrossRef Subramanian CM, Cherukuri AK, Chelliah C (2015) Modeling fuzzy role based access control using fuzzy formal concept analysis. In: International symposium on security in computing and communication. Springer International Publishing, New York, 176–185CrossRef
47.
go back to reference Thion R, Coulondre S (2006) Representation and reasoning on role-based access control policies with conceptual graphs. In: International conference on conceptual structures. Springer, Berlin Heidelberg, 427–440MATH Thion R, Coulondre S (2006) Representation and reasoning on role-based access control policies with conceptual graphs. In: International conference on conceptual structures. Springer, Berlin Heidelberg, 427–440MATH
48.
go back to reference Ultra JD, Pancho-Festin S (2017) A simple model of separation of duty for access control models. Comput Secur 68:69–80CrossRef Ultra JD, Pancho-Festin S (2017) A simple model of separation of duty for access control models. Comput Secur 68:69–80CrossRef
49.
go back to reference Unal D, Çaglayan MU (2013) A formal role-based access control model for security policies in multi-domain mobile networks. Comput Netw 57(1):330–350CrossRef Unal D, Çaglayan MU (2013) A formal role-based access control model for security policies in multi-domain mobile networks. Comput Netw 57(1):330–350CrossRef
50.
go back to reference Yao Y (2013) Granular computing and sequential three-way decisions. In: Rough sets and knowledge technology: 8th international conference, RSKT 2013. Springer, New York, 16–27CrossRef Yao Y (2013) Granular computing and sequential three-way decisions. In: Rough sets and knowledge technology: 8th international conference, RSKT 2013. Springer, New York, 16–27CrossRef
51.
go back to reference Yao Y (2016) Interval sets and three-way concept analysis in incomplete contexts. Int J Mach Learn Cybernet 8(1):3–20CrossRef Yao Y (2016) Interval sets and three-way concept analysis in incomplete contexts. Int J Mach Learn Cybernet 8(1):3–20CrossRef
52.
go back to reference Yevtushenko SA (2000) System of data analysis Concept Explorer. In: Proceedings of the 7th national conference on artificial intelligence KII-2000, Russia, pp 127–134 (in Russian) Yevtushenko SA (2000) System of data analysis Concept Explorer. In: Proceedings of the 7th national conference on artificial intelligence KII-2000, Russia, pp 127–134 (in Russian)
53.
go back to reference Zhang R, Artale A, Giunchiglia F, Crispo B (2009) Using description logics in relation based access control. University of Trento, Trento Zhang R, Artale A, Giunchiglia F, Crispo B (2009) Using description logics in relation based access control. University of Trento, Trento
54.
go back to reference Zhao C, Heilili N, Liu S, Lin Z (2005) Representation and reasoning on rbac: a description logic approach. In: International colloquium on theoretical aspects of computing. Springer, Berlin Heidelberg, pp 381–393MATH Zhao C, Heilili N, Liu S, Lin Z (2005) Representation and reasoning on rbac: a description logic approach. In: International colloquium on theoretical aspects of computing. Springer, Berlin Heidelberg, pp 381–393MATH
Metadata
Title
Role based access control design using three-way formal concept analysis
Authors
Chandra Mouliswaran Subramanian
Aswani Kumar Cherukuri
Chandrasekar Chelliah
Publication date
30-06-2018
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Machine Learning and Cybernetics / Issue 11/2018
Print ISSN: 1868-8071
Electronic ISSN: 1868-808X
DOI
https://doi.org/10.1007/s13042-018-0840-7

Other articles of this Issue 11/2018

International Journal of Machine Learning and Cybernetics 11/2018 Go to the issue