Model of multilevel access system
DOI:
https://doi.org/10.18372/2225-5036.23.11817Keywords:
data protection, system access level of privacy, security level, public data, exposure value, a model of access, multi-accessAbstract
This paper highlights the model of multilevel access system to information and data that can provide a real implementation of adequate and affordable access procedures.The functioning of the model is organized in several stages, which include: the first stage of the implementation of the method for authorizing the use of secret data by the task, which consists in analyzing the parameters of tasks, on the basis of which the algorithm for processing them is selected, followed by the transfer of the results of processing to the corresponding task, authorization to use secret data task is to process data by algorithms of the authorization system, and the result of the form In the form of recommendations in the future functioning of the process of solving an applied problem, the third stage of the implementation of the method for authorizing the use of secret data by the task, the results obtained by the applied problem in the subject area. The model based on the use of funds related to data protection: preparation of a request for access, authentication user empowerment, the use of secrecy, a certain level of security. The model uses two levels of access: zero when the user does not need secret data and the first where such data are necessary for solving the problem.
References
Y. Zhou, L. Ma, M. Wen, «Task-Constrained RBAC Model and Its Privilege Redundancy Analysis», 2nd International Conference on Information Science and Control Engineering, pp. 489–492, 2015.
C. Pengrui, W. LingDa, Ya. Chao, Yu Ronghuan, «A hierarchical Access Control model of software repository based on RBAC», 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), pp. 761–765, 2016,
P.-C. Cheng, P. Rohatgi, C. Keser, P. Karger, G. Wagner, A. Reninger, «Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control», IEEE Symposium on Security and Privacy (SP ’07), pp. 222–230, 2007.
M. VenkataSwamy, S. Ramaswamy, N. Agarwal, «CBPM: Context Based Privacy Model», IEEE Second International Conference on Social Computing, pp. 1050–1055, 2010.
P. E. Engelstad, «On the Usability of Clustering for Topic-Oriented Multi-level Security Models», IEEE European Modelling Symposium (EMS), p. 14–20, 2015.
D. Thorleuchter, D. Van den Poel, «High granular multi-level-security model for improved usability», International Conference on System science, Engineering design and Manufacturing informatization, pp. 191–194, 2011.