Specifying and enforcing the principle of least privilege in role-based access control

被引:7
|
作者
Ma, Xiaopu [1 ,2 ]
Li, Ruixuan [1 ]
Lu, Zhengding [1 ]
Lu, Jianfeng [1 ]
Dong, Meng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Hubei, Peoples R China
[2] Nanyang Normal Univ, Coll Comp & Informat Technol, Nanyang 473061, Henan, Peoples R China
来源
关键词
role-based access control; principle of least privilege; weight; enforcement; INTEROPERATION;
D O I
10.1002/cpe.1731
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The principle of least privilege in role-based access control is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that the existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of least privilege problem and present different variations, called the delta-approx principle of least privilege problem and the minimizing-approx principle of least privilege problem. Since there may be more than one result to enforce the same principle of least privilege, we introduce the notation about weights of permissions and roles to optimize the results. Then we prove that all least privilege problems are NP-complete. As an important contribution of the paper, we show that the principle of least privilege problem can be reduced to minimal cost set covering (MCSC) problem. We can borrow the existing solutions of MCSC to solve the principle of least privilege problems. Finally, different algorithms are designed to solve the proposed least privilege problems. Experiments on performance study prove the superiority of our algorithms. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:1313 / 1331
页数:19
相关论文
共 50 条
  • [41] Role-based access control in TOBIAS and NESS
    Marshall, LF
    [J]. IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [42] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    [J]. THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [43] Role-based privilege and trust management
    Shin, D
    Ahn, GJ
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (06): : 401 - 410
  • [44] Adding Attributes to Role-Based Access Control
    Kuhn, D. Richard
    Coyne, Edward J.
    Weil, Timothy R.
    [J]. COMPUTER, 2010, 43 (06) : 79 - 81
  • [45] Cryptographic Role-Based Access Control, Reconsidered
    Liu, Bin
    Michalas, Antonis
    Warinschi, Bogdan
    [J]. PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 : 282 - 289
  • [46] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [47] Role-Based Access Control Models for Android
    Talegaon, Samir
    Krishnan, Ram
    [J]. 2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 179 - 188
  • [48] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [49] Concurrency and Time in Role-Based Access Control
    Chiang, Chia-Chu
    Bayrak, Coskun
    [J]. ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 37 - 42
  • [50] Role-Based Access Control Modeling and Validation
    Haraty, Ramzi A.
    Naous, Mirna
    [J]. 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,