Research on the multi-granularity method of role engineering

Published on November 9, 2022

Imagine you’re a chef trying to prepare a feast for a large banquet. You need to assign different roles to your sous chefs, prep cooks, and servers to ensure a smooth operation. But as the guest list grows, it becomes increasingly challenging to develop a system that meets the necessary security requirements without sacrificing efficiency. That’s where role engineering comes in — it’s like creating a well-organized kitchen brigade! In this study, researchers explored how incorporating a multi-granularity method into the role formulation process of RBAC (role-based access control) can simplify the complexity of the problem and improve the efficiency of the RBAC role engineer. It’s like finding the right balance between tasks and resources in your culinary team! By using the concept lattice reduction method, they were able to streamline the role concept lattice and reduce the workload for system security administrators, just like delegating specific responsibilities to different team members. Interested in learning more? Check out the full article!

The role-based access control model (RBAC) is an access control approach oriented to enterprise security policy, which plays a leading role in the field of access control due to its good applicability and flexibility. However, as the scale of access subjects and access objects expands, it becomes more difficult to develop a role engineering system that meets security requirements. Particle size calculation can reduce or improve the particle size of the problem and improve efficiency on the premise of obtaining satisfactory solutions. In this study, the granularity calculation method was introduced into the role formulation process of RBAC, which can effectively reduce the complexity of the problem and improve the efficiency of the RBAC role engineer. At the same time, the concept lattice reduction method was used to reduce the role concept lattice and reduce the workload of the system security administrator.

Read Full Article (External Site)

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes:

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>