Role-based Information Flow Control Models

被引:15
|
作者
Nakamura, Shigenari [1 ]
Doulikun, Dilewaer [1 ]
Aikebaier, Ailixier [2 ]
Enokido, Tomoya [3 ]
Takizawa, Makoto [1 ]
机构
[1] Hosei Univ, Tokyo, Japan
[2] NICT, Tokyo, Japan
[3] Rissho Univ, Tokyo, Japan
关键词
Role-based access control (RBAC) model; Information flow control; Role-based synchronization (RBS) protocol; Object-based synchronization (OBS) protocol;
D O I
10.1109/AINA.2014.139
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In information systems, data in an object may illegally flow into another object if a subject manipulates the objects. In this paper, we discuss information flow control models to prevent illegal information to occur in the role-based access control (RBAC) model. First, we define a legal information flow relation r(i) double right arrow r(j) among roles r(i) and r(j). It means, if a subject granted the role r(i) manipulates objects before another subject granted the role r(j), no illegal information flow occur. We discuss safe systems where no illegal information flow occur even if operations from different subjects are performed in any order. Then, we discuss a role-based synchronization (RBS) protocol and an object-based synchronization (OBS) protocol to prevent illegal information flow in unsafe systems. Here, a transaction is aborted if the transaction reads an object and illegal information flow might occur. In the RBS protocol, the illegal information flow condition is specified in terms of roles while objects in the OBS protocol. We evaluate the RBS and OBS protocols in terms of number of transactions aborted.
引用
收藏
页码:1140 / 1147
页数:8
相关论文
共 50 条
  • [1] Paralocks - Role-Based Information Flow Control and Beyond
    Broberg, Niklas
    Sands, David
    [J]. ACM SIGPLAN NOTICES, 2010, 45 (01) : 431 - 444
  • [2] Paralocks - Role-Based Information Flow Control and Beyond
    Broberg, Niklas
    Sands, David
    [J]. POPL'10: PROCEEDINGS OF THE 37TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES, 2010, : 431 - 444
  • [3] Information flow control in role-based model for distributed objects
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2001, : 363 - 370
  • [4] Information flow control among objects in role-based access control model
    Izaki, K
    Tanaka, K
    Takizawa, M
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, 2001, 2113 : 299 - 308
  • [5] Preventing Illegal Information Flow Based on Role-Based Access Control Model
    Enokido, Toaloya
    Takizawa, Makoto
    [J]. NETWORK-BASED INFORMATION SYSTEMS, PROCEEDINGS, 2008, 5186 : 242 - +
  • [6] A legal information flow (LIF) scheduler based on role-based access control model
    Enokido, Tomoya
    Barolli, Valbona
    Takizawa, Makoto
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 906 - 912
  • [7] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [8] Synchronization Protocols to Prevent Illegal Information Flow in Role-based Access Control Systems
    Nakamura, Shigenari
    Doulikun, Dilewaer
    Aikebaier, Ailixier
    Enokido, Tomoya
    Takizawa, Makoto
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 279 - 286
  • [9] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    [J]. PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [10] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
    Zhu, Rui-Feng
    Ning, Jie
    Yu, Pei
    [J]. 2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428