RBAC with ABS Implementation Practicalities for RBAC Integrity Policies

被引:0
|
作者
Kiviharju, Mikko [1 ]
机构
[1] Finnish Def Res Agcy, Riihimaki, Finland
来源
2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT) | 2014年
关键词
MLS; RBAC; CBIS; ABE; Cryptography; Access Control Models;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Role-based access control (RBAC) is the de facto access control model used in current information systems. Cryptographic access control (CAC), on the other hand, is an implementation paradigm intended to enforce AC-policies cryptographically. CAC-methods are also attractive in cloud environments due to their distributed and offline nature of operation. Combining the capabilities of both RBAC and CAC fully seems elusive, though. This paper studies the feasibility of implementing RBAC with respect to write-permissions using a recent type of cryptographic schemes called attribute-based signatures (ABS), which fall under a concept called functional cryptography. We map the functionalities and elements of RBAC to ABS elements and show a sample XACML-based architecture, how signature generation and verification conforming to RBAC-type processes could be implemented.
引用
收藏
页码:500 / 509
页数:10
相关论文
共 50 条
  • [1] Implementing RBAC policies
    Barker, S
    Douglas, P
    Fanning, T
    RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 27 - 36
  • [2] Implementing Chinese wall policies on RBAC
    School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
    不详
    Jisuanji Yanjiu yu Fazhan, 2007, 4 (615-622):
  • [3] Gran: model checking grsecurity RBAC policies
    Bugliesi, Michele
    Calzavara, Stefano
    Focardi, Riccardo
    Squarcina, Marco
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 126 - 138
  • [4] RBAC policy implementation for SQL databases
    Barker, S
    Douglas, P
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 288 - 301
  • [5] Deploying ABAC policies using RBAC systems
    Batra, Gunjan
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    Sural, Shamik
    JOURNAL OF COMPUTER SECURITY, 2019, 27 (04) : 483 - 506
  • [6] Enabling the Deployment of ABAC Policies in RBAC Systems
    Batra, Gunjan
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    Sural, Shamik
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018, 2018, 10980 : 51 - 68
  • [7] The Problem of Integrity in RBAC-Based Policies within Relational Databases: Synthesis and Problem Study
    Jaidi, Faouzi
    Labbene Ayachi, Faten
    ACM IMCOM 2015, PROCEEDINGS, 2015,
  • [8] Migrating from RBAC to temporal RBAC
    Mitra, Barsha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    IET INFORMATION SECURITY, 2017, 11 (05) : 294 - 300
  • [9] Design and Implementation of the RBAC-SOA Model
    Qu, Zhaoyang
    Meng, Na
    ICSP: 2008 9TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-5, PROCEEDINGS, 2008, : 2945 - +
  • [10] GEO-RBAC: A spatially aware RBAC
    Damiani, Maria Luisa
    Bertino, Elisa
    Catania, Barbara
    Perlasca, Paolo
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2007, 10 (01)