Affiliation:
1. University of Dortmund, Dortmund, Germany
Abstract
In large organizations the administration of access privileges (such as the assignment of access rights to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be necessary, or a veto may be possible for such a decision. In this paper, we present two major contributions: We develop a
role-based access control
(RBAC) approach for specifying distributed administration requirements, and procedures between administrators, or administration teams, extending earlier work on distributed (modular) authorization. While a comprehensive specification in such a language is conceivable it would be quite tedious to evaluate, or analyze, their operational aspects and properties in practice. For this reason we create a new class of extended Petri Nets called Administration Nets (Adm-Nets) such that any RBAC specification of (cooperative) administration requirements (given in terms of predicate logic formulas) can be embedded into an Adm-Net. This net behaves within the constraints specified by the logical formulas, and at the same time, it
explicitly
exhibits all needed operational details such as allowing for an efficient and comprehensive formal analysis of administrative behavior. We introduce the new concepts and illustrate their use in several examples. While Adm-Nets are much more refined and (behaviorally) explicit than workflow systems our work provides for a constructive step towards novel workflow management tools as well. We demonstrate the usefulness of Adm-Nets by modeling typical examples of administration processes concerned with sets of distributed authorization rules.
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Collaborative Administration of Role-Based Access Control in Smart Contracts;2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS);2022-09-27
2. Applying a usage control model in an operating system kernel;Journal of Network and Computer Applications;2011-07
3. Domain Administration of Task-role Based Access Control for Process Collaboration Environments;2009 Fifth International Conference on Information Assurance and Security;2009
4. Individual Access to IT Resources Using User Context;2009 Second International Conference on Advances in Human-Oriented and Personalized Mechanisms, Technologies, and Services;2009
5. Security Analysis of Role Based Access Control Models Using Colored Petri Nets and CPNtools;Transactions on Computational Science IV;2009