Object-Specific Role-Based Access Control

被引:5
|
作者
Mundbrod, Nicolas [1 ]
Reichert, Manfred [1 ]
机构
[1] Ulm Univ, Inst Databases & Informat Syst, D-89073 Ulm, Germany
关键词
Object-specific role-based access control; access control; authorization; role-based access control; instance-specific access control; SUPPORT; MODEL; RBAC;
D O I
10.1142/S0218843019500035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proper management of privacy and security constraints in information systems in general and access control in particular constitutes a tremendous, but still prevalent challenge. Role-based access control (RBAC) and its variations can be considered as the widely adopted approach to realize authorization in information systems. However, RBAC lacks a proper object-specific support, which disallows establishing the fine-grained access control required in many domains. By comparison, attribute-based access control (ABAC) enables a fine-grained access control based on policies and rules evaluating attributes. As a drawback, ABAC lacks the abstraction of roles. Moreover. it is challenging to engineer and to audit the granted privileges encoded in rule-based policies. This paper presents the generic approach of object-specific role-based access control (ORAC). On one hand, ORAC enables information system engineers, administrators and users to utilize the well-known principle of roles. On the other hand, ORAC allows realizing the access to objects in a fine-grained way where required. The approach was systematically established according to well-elicited key requirements for fine-grained access control in information systems. For the purpose of evaluation, the approach was applied to real-world scenarios and implemented in a proof-of-concept prototype demonstrating its feasibility and applicability.
引用
收藏
页数:30
相关论文
共 50 条
  • [21] Towards modal logic formalization of role-based access control with object classes
    Chae, Junghwa
    Formal Techniques for Networked and Distributed Systems - FORTE 2007, 2007, 4574 : 97 - 111
  • [22] An object oriented role-based access control model for secure domain environments
    Department of Electrical and Computer Engineering, Ryerson University, Toronto, ON, M5B 2K3, Canada
    Int. J. Netw. Secur., 2007, 1 (10-16):
  • [23] An attributable role-based access control for healthcare
    Schwartmann, D
    COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [24] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [25] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [26] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [27] Role-based access control in TOBIAS and NESS
    Marshall, LF
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [28] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [29] Role-based access control consistency validation
    Centonze, Paolina
    Naumovich, Gleb
    Fink, Stephen J.
    Pistoia, Marco
    Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
  • [30] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +