Role-based Information Flow Control Models

被引:15
|
作者
Nakamura, Shigenari [1 ]
Doulikun, Dilewaer [1 ]
Aikebaier, Ailixier [2 ]
Enokido, Tomoya [3 ]
Takizawa, Makoto [1 ]
机构
[1] Hosei Univ, Tokyo, Japan
[2] NICT, Tokyo, Japan
[3] Rissho Univ, Tokyo, Japan
关键词
Role-based access control (RBAC) model; Information flow control; Role-based synchronization (RBS) protocol; Object-based synchronization (OBS) protocol;
D O I
10.1109/AINA.2014.139
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In information systems, data in an object may illegally flow into another object if a subject manipulates the objects. In this paper, we discuss information flow control models to prevent illegal information to occur in the role-based access control (RBAC) model. First, we define a legal information flow relation r(i) double right arrow r(j) among roles r(i) and r(j). It means, if a subject granted the role r(i) manipulates objects before another subject granted the role r(j), no illegal information flow occur. We discuss safe systems where no illegal information flow occur even if operations from different subjects are performed in any order. Then, we discuss a role-based synchronization (RBS) protocol and an object-based synchronization (OBS) protocol to prevent illegal information flow in unsafe systems. Here, a transaction is aborted if the transaction reads an object and illegal information flow might occur. In the RBS protocol, the illegal information flow condition is specified in terms of roles while objects in the OBS protocol. We evaluate the RBS and OBS protocols in terms of number of transactions aborted.
引用
收藏
页码:1140 / 1147
页数:8
相关论文
共 50 条
  • [31] Role-based access control in JavaTM
    Fondazione Ugo Bordoni, Roma, Italy
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 1998, : 91 - 100
  • [32] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [33] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [34] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [35] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [36] Study of Role-based Access Control
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [37] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [38] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [39] Formal Z specifications of several flat Role-Based Access Control models
    Abdallah, Ali E.
    Khayat, Etienne J.
    [J]. 30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +
  • [40] ROLE-BASED MODELS OF ADVERTISING CREATION AND PRODUCTION
    HIRSCHMAN, EC
    [J]. JOURNAL OF ADVERTISING, 1989, 18 (04) : 42 - 53