AMTRAC: An administrative model for temporal role-based access control

被引:8
|
作者
Sharma, Manisha [1 ]
Sural, Shamik [1 ]
Vaidya, Jaideep [2 ,3 ]
Atluri, Vijayalakshmi [2 ,3 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Rutgers State Univ, MSIS Dept, Piscataway, NJ 08855 USA
[3] Rutgers State Univ, CIMIC, Piscataway, NJ 08855 USA
基金
美国国家科学基金会;
关键词
Administrative model; Temporal RBAC; Role enabling base assignment; Administrative command; Role hierarchy; PROTECTION;
D O I
10.1016/j.cose.2013.07.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the years, Role Based Access Control (RBAC) has received significant attention in system security and administration. The Temporal Role Based Access Control (TRBAC) model is an extension of RBAC that allows one to specify periodic enabling and disabling of roles in a role enabling base (REB). While decentralized administration and delegation of administrative responsibilities in large RBAC systems is managed using an administrative role based access control model like ARBAC97, no administrative model for TRBAC has yet been proposed. In this paper, we introduce such a model and name it AMTRAC (Administrative Model for Temporal Role based Access Control). AMTRAC defines a broad range of relations that control user-role assignment, role-permission assignment, role role assignment and role enabling base assignment. Since the first three are similar to those in ARBAC97, the role enabling base assignment component has been discussed in detail in this paper. The different ways by which role enabling conditions of regular roles can be modified are first explained. We then show how to specify which of the administrative roles are authorized to modify the role enabling conditions of any regular role. An exhaustive set of commands for authorization enforcement along with their pre and postconditions is also presented. Together, this would facilitate practical deployment and security analysis of TRBAC systems. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:201 / 218
页数:18
相关论文
共 50 条
  • [41] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [42] An Extended Role-Based Access Control Model for CSCW Systems
    Chen, Bing
    [J]. MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582
  • [43] Enterprise model as a basis of administration on role-based access control
    Oh, S
    Park, S
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON COOPERATIVE DATABASE SYSTEMS FOR ADVANCED APPLICATIONS, 2000, : 150 - 158
  • [44] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [45] Study of Role-based Access Control
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [46] Integrating Role-Based Access Control Model with Web Server
    Li, Celia
    Yang, Cungang
    Qin, Ling
    Yang, Yiguang
    [J]. 2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009), 2009, : 615 - 618
  • [47] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    [J]. International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [48] Role-based Access Control Model in Home Network Environments
    Kim, Do-Woo
    Kim, Geon Woo
    Lee, Jun-Ho
    Han, Jong-Wook
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 97 - 99
  • [49] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [50] An Extended Role-Based Access Control Model for Delegating Obligations
    Ben-Ghorbel-Talbi, Meriam
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Bouhoula, Adel
    [J]. TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 127 - +