Affiliation:
1. King's College London
2. Imperial College London
3. George Mason University
Abstract
Despite their widespread adoption, Role-based Access Control (RBAC) models exhibit certain shortcomings that make them less than ideal for deployment in, for example, distributed access control. In the distributed case, standard RBAC assumptions (e.g., of relatively static access policies, managed by human users, with complete information available about users and job functions) do not necessarily apply. Moreover, RBAC is restricted in the sense that it is based on one type of ascribed status, an assignment of a user to a role. In this article, we introduce the status-based access control (SBAC) model for distributed access control. The SBAC model (or family of models) is based on the notion of users having an action status as well as an ascribed status. A user's action status is established, in part, from a history of events that relate to the user; this history enables changing access policy requirements to be naturally accommodated. The approach can be implemented as an autonomous agent that reasons about the events, actions, and a history (of events and actions), which relates to a requester for access to resources, in order to decide whether the requester is permitted the access sought. We define a number of algebras for composing SBAC policies, algebras that exploit the language that we introduce for SBAC policy representation: identification-based logic programs. The SBAC model is richer than RBAC models and the policies that can be represented in our approach are more expressive than the policies admitted by a number of monotonic languages that have been hitherto described for representing distributed access control requirements. Our algebras generalize existing algebras that have been defined for access policy composition. We also describe an approach for the efficient implementation of SBAC policies.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. EVL: A Typed Higher-order Functional Language for Events;Electronic Notes in Theoretical Computer Science;2020-09
2. A novel predicate based access control scheme for cloud environment using open stack swift storage;Peer-to-Peer Networking and Applications;2020-07-26
3. Admin-CBAC;Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy;2020-03-16
4. Specification and Analysis of ABAC Policies via the Category-based Metamodel;Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy;2019-03-13
5. Cloud Multidomain Access Control Model Based on Role and Trust-Degree;Journal of Electrical and Computer Engineering;2016