Policy analysis for Administrative Role-Based Access Control

被引:19
|
作者
Sasturkar, Amit [2 ,3 ]
Yang, Ping [1 ,3 ]
Stoller, Scott D. [3 ]
Ramakrishnan, C. R. [3 ]
机构
[1] SUNY Binghamton, Dept Sci, Binghamton, NY 13902 USA
[2] Yahoo Inc, Sunnyvale, CA USA
[3] SUNY Stony Brook, Stony Brook, NY USA
基金
美国国家科学基金会;
关键词
PROTECTION; COMPLEXITY;
D O I
10.1016/j.tcs.2011.05.009
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Role-Based Access Control (RBAC) is a widely used model for expressing access control policies. In large organizations, the RBAC policy may be collectively managed by many administrators. Administrative RBAC (ARBAC) models express the authority of administrators, thereby specifying how an organization's RBAC policy may change. Changes by one administrator may interact in unintended ways with changes by other administrators. Consequently, the effect of an ARBAC policy is hard to understand by simple inspection. In this paper, we consider the problem of analyzing ARBAC policies. Specifically, we consider reachability properties (e.g., whether a user can eventually be assigned to a role by a group of administrators), availability properties (e.g., whether a user cannot be removed from a role by a group of administrators), containment properties (e.g., every member of one role is also a member of another role) satisfied by a policy, and information flow properties. We show that reachability analysis for ARBAC is PSPACE-complete. We also give algorithms and complexity results for reachability and related analysis problems for several categories of ARBAC policies, defined by simple restrictions on the policy language. Some of these results are based on the connection we establish between security policy analysis and planning problems in Artificial Intelligence. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:6208 / 6234
页数:27
相关论文
共 50 条
  • [1] Symbolic reachability analysis for parameterized administrative role-based access control
    Stoller, Scott D.
    Yang, Ping
    Gofman, Mikhail I.
    Ramakrishnan, C. R.
    [J]. COMPUTERS & SECURITY, 2011, 30 (2-3) : 148 - 164
  • [2] Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control
    Ranise, Silvio
    Truong, Anh
    Armando, Alessandro
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 103 - 114
  • [3] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [4] VAC - Verifier of Administrative Role-Based Access Control Policies
    Ferrara, Anna Lisa
    Madhusudan, P.
    Nguyen, Truc L.
    Parlato, Gennaro
    [J]. COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 184 - 191
  • [5] Planning User Assignment in Administrative Role-Based Access Control
    Huang, Wei
    Yang, Yang
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 615 - +
  • [6] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [7] Efficient Policy Analysis for Administrative Role Based Access Control
    Stoller, Scott D.
    Yang, Ping
    Ramakrishnan, C. R.
    Gofman, Mikhail I.
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +
  • [8] Policy Analysis for Self-administrated Role-Based Access Control
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 432 - 447
  • [9] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [10] An Administrative Model for Role-Based Access Control Using Hierarchical Namespace
    Xia, Luning
    Jing, Jiwu
    [J]. PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 181 - 188