Affiliation:
1. Purdue University, West Lafayette, IN
2. Motorola Labs, Schaumburg, IL
Abstract
The administration of large role-based access control (RBAC) systems is a challenging problem. In order to administer such systems, decentralization of administration tasks by the use of delegation is an effective approach. While the use of delegation greatly enhances flexibility and scalability, it may reduce the control that an organization has over its resources, thereby diminishing a major advantage RBAC has over discretionary access control (DAC). We propose to use security analysis techniques to maintain desirable security properties while delegating administrative privileges. We give a precise definition of a family of security analysis problems in RBAC, which is more general than safety analysis that is studied in the literature. We show that two classes of problems in the family can be reduced to similar analysis in the RT[↞∩] role-based trust-management language, thereby establishing an interesting relationship between RBAC and the
RT
framework. The reduction gives efficient algorithms for answering most kinds of queries in these two classes and establishes the complexity bounds for the intractable cases.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference30 articles.
1. Role-based authorization constraints specification
2. Crampton J. 2002. Authorizations and antichains. Ph.D. thesis Birbeck College University of London UK. Crampton J. 2002. Authorizations and antichains. Ph.D. thesis Birbeck College University of London UK.
3. Administrative scope
4. Proposed NIST standard for role-based access control
Cited by
115 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Dynamic Assignment of Roles and Users for Business Processes Under Security Requirements;IEEE Transactions on Industrial Informatics;2023-10
2. Role of Access Control in Information Security: A Security Analysis Approach;Information Security and Privacy in the Digital World - Some Selected Topics;2023-09-27
3. Smart Building IoT Cybersecurity: A Review of Threats and Mitigation Technique;2023 IEEE 21st Jubilee International Symposium on Intelligent Systems and Informatics (SISY);2023-09-21
4. MS-UCON: A Usage Control Model for Meteorological Operational Systems;2023 19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD);2023-07-29
5. Blockchain-based dynamic trust access control game mechanism;Journal of King Saud University - Computer and Information Sciences;2023-02