Specifying and enforcing the principle of least privilege in role-based access control

被引:7
|
作者
Ma, Xiaopu [1 ,2 ]
Li, Ruixuan [1 ]
Lu, Zhengding [1 ]
Lu, Jianfeng [1 ]
Dong, Meng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[2] Nanyang Normal Univ, Coll Comp & Informat Technol, Nanyang 473061, Henan, Peoples R China
来源
关键词
role-based access control; principle of least privilege; weight; enforcement; INTEROPERATION;
D O I
10.1002/cpe.1731
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The principle of least privilege in role-based access control is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that the existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of least privilege problem and present different variations, called the delta-approx principle of least privilege problem and the minimizing-approx principle of least privilege problem. Since there may be more than one result to enforce the same principle of least privilege, we introduce the notation about weights of permissions and roles to optimize the results. Then we prove that all least privilege problems are NP-complete. As an important contribution of the paper, we show that the principle of least privilege problem can be reduced to minimal cost set covering (MCSC) problem. We can borrow the existing solutions of MCSC to solve the principle of least privilege problems. Finally, different algorithms are designed to solve the proposed least privilege problems. Experiments on performance study prove the superiority of our algorithms. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1313 / 1331
页数:19
相关论文
共 50 条
  • [1] Quantitative analysis and enforcement of the principle of least privilege in role-based access control
    Lai, Chunren
    Zhang, Chang N.
    [J]. SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 69 - +
  • [2] Enforcing the principle of least privilege with a state-based privilege control model
    Liang, B
    Liu, H
    Shi, WC
    Wu, YJ
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 109 - 120
  • [3] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
    Cadenhead, Tyrone
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 209 - 224
  • [4] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
  • [5] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
    Sohr, Karsten
    Mustafa, Tanveer
    Bao, Xinyu
    Ahn, Gail-Joon
    [J]. 24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
  • [6] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [7] A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure
    ZHANG Shaomin~ 1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1827 - 1830
  • [8] An approach to enforcing Clark-Wilson model in role-based access control model
    Liang, B
    Shi, WC
    Sun, YF
    Sun, B
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (04) : 596 - 599
  • [9] Specifying role-based access constraints with object constraint language
    Wang, H
    Zhang, YC
    Cao, JL
    Yang, J
    [J]. ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 687 - 696
  • [10] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157