λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL

被引:2
|
作者
Jagadeesan, Radha [1 ]
Jeffrey, Alan [2 ]
Pitcher, Corin [1 ]
Riely, James [1 ]
机构
[1] Depaul Univ, CTI, Chicago, IL 60604 USA
[2] Bell Labs, Murray Hill, NJ 07974 USA
基金
美国国家科学基金会;
关键词
role-based access control; lambda-calculus; static analysis;
D O I
10.2168/LMCS-4(1:2)2008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We study mechanisms that permit program components to express role constraints on clients, focusing on programmatic security mechanism, which permit access controls to be expressed, in situ, as part of the code realizing basic functionality. In this setting, two questions immediately arise. (1) The user of a component faces the issue of safety: is a particular role sufficient to use the component? (2) The component designer faces the dual issue of protection: is a particular role demanded in all execution paths of the component? We provide a formal calculus and static analysis to answer both questions.
引用
收藏
页数:25
相关论文
共 50 条
  • [1] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [2] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [3] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [4] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
  • [5] I-RBAC: Isolation Enabled Role-Based Access Control
    Gunti, Nagajyothi
    Sun, Weiqing
    Niamat, Mohammed
    [J]. 2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 79 - 86
  • [6] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
  • [7] UC-RBAC: A usage constrained role-based access control model
    Xu, Z
    Feng, DG
    Li, L
    Chen, H
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 337 - 347
  • [8] RBAC-SC: Role-Based Access Control Using Smart Contract
    Cruz, Jason Paul
    Kaji, Yuichi
    Yanai, Naoto
    [J]. IEEE ACCESS, 2018, 6 : 12240 - 12251
  • [9] RBAC standard rationale - Comments on "A Critique of the ANSI Standard on Role-Based Access Control"
    Ferraiolo, David
    Kuhn, Rick
    Sandhu, Ravi
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (06) : 51 - 53
  • [10] RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain
    Xu, Zhiyu
    Jiao, Tengyun
    Yang, Lin
    Liu, Donghai
    Wen, Sheng
    Xiang, Yang
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 439 - 453