Object-Specific Role-Based Access Control

被引:5
|
作者
Mundbrod, Nicolas [1 ]
Reichert, Manfred [1 ]
机构
[1] Ulm Univ, Inst Databases & Informat Syst, D-89073 Ulm, Germany
关键词
Object-specific role-based access control; access control; authorization; role-based access control; instance-specific access control; SUPPORT; MODEL; RBAC;
D O I
10.1142/S0218843019500035
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The proper management of privacy and security constraints in information systems in general and access control in particular constitutes a tremendous, but still prevalent challenge. Role-based access control (RBAC) and its variations can be considered as the widely adopted approach to realize authorization in information systems. However, RBAC lacks a proper object-specific support, which disallows establishing the fine-grained access control required in many domains. By comparison, attribute-based access control (ABAC) enables a fine-grained access control based on policies and rules evaluating attributes. As a drawback, ABAC lacks the abstraction of roles. Moreover. it is challenging to engineer and to audit the granted privileges encoded in rule-based policies. This paper presents the generic approach of object-specific role-based access control (ORAC). On one hand, ORAC enables information system engineers, administrators and users to utilize the well-known principle of roles. On the other hand, ORAC allows realizing the access to objects in a fine-grained way where required. The approach was systematically established according to well-elicited key requirements for fine-grained access control in information systems. For the purpose of evaluation, the approach was applied to real-world scenarios and implemented in a proof-of-concept prototype demonstrating its feasibility and applicability.
引用
收藏
页数:30
相关论文
共 50 条
  • [31] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [32] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380
  • [33] Role-based access control model for GIS
    Pan, Yuqing
    Sheng, Yehua
    Zhou, Jieyu
    GEOINFORMATICS 2007: GEOSPATIAL INFORMATION TECHNOLOGY AND APPLICATIONS, PTS 1 AND 2, 2007, 6754
  • [34] Modal logic for role-based access control
    Kosiyatrakul, T
    Older, S
    Chin, SK
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2005, 3685 : 179 - 193
  • [35] Garbled role-based access control in the cloud
    Masoom Alam
    Naina Emmanuel
    Tanveer Khan
    Yang Xiang
    Houcine Hassan
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1153 - 1166
  • [36] Cryptographic Enforcement of Role-Based Access Control
    Crampton, Jason
    FORMAL ASPECTS OF SECURITY AND TRUST, 2011, 6561 : 191 - 205
  • [37] Hierarchical role-based access control development
    Kolegov, D. N.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2012, 17 (03): : 70 - 76
  • [38] Role-based access control for web services
    College of Information Sciences and Technology, Donghua University, 1882 Yan'an Road , Shanghai 200051, China
    WSEAS Trans. Inf. Sci. Appl., 2006, 8 (1553-1558):
  • [39] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [40] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42