Role-based access control for a distributed calculus

被引:7
|
作者
Braghin, Chiara [1 ]
Gorla, Daniele [2 ]
Sassone, Vladimiro [3 ]
机构
[1] Univ Ca Foscari Venezia, Dip Informat, Venice, Italy
[2] Univ Roma La Sapienza, Dip Informat, Rome, Italy
[3] Univ Sussex, Dept Informat, Brighton, E Sussex, England
关键词
RBAC; process calculi; Type Systems; Behavioural Equivalences;
D O I
10.3233/JCS-2006-14202
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users. In this paper, we present a formal framework relying on an extension of the p-calculus to study the behaviour of concurrent systems in a RBAC scenario. We define a type system ensuring that the specified policy is respected during computations, and a behavioural equivalence to equate systems. We then consider a more sophisticated feature that can be easily integrated in our framework, i.e., the possibility of automatically adding role activations and deactivations to processes to be run under a given policy (whenever possible). Finally, we show how the framework can be easily extended to express significant extensions of the core RBAC model, such as roles hierarchies or constraints determining the acceptability of the system components.
引用
收藏
页码:113 / 155
页数:43
相关论文
共 50 条
  • [31] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [32] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    [J]. FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [33] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    [J]. GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [34] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [35] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [36] Hierarchical role-based access control development
    Kolegov, D. N.
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [37] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    [J]. COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [38] Adding Attributes to Role-Based Access Control
    Kuhn, D. Richard
    Coyne, Edward J.
    Weil, Timothy R.
    [J]. COMPUTER, 2010, 43 (06) : 79 - 81
  • [39] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [40] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289