Modelling and Verification of Dynamic Role-Based Access Control

被引:3
|
作者
Vistbakka, Inna [1 ]
Troubitsyna, Elena [1 ,2 ]
机构
[1] Abo Akad Univ, Turku, Finland
[2] KTH, Stockholm, Sweden
关键词
D O I
10.1007/978-3-030-00359-3_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controlling access to resources is essential for ensuring correctness of system functioning. Role-Based Access Control (RBAC) is a popular authorisation model that regulates the user's rights to manage system resources based on the user's role. In this paper, we extend the traditional static approach to defining RBAC and propose as well as formalise a dynamic RBAC model. It allows a designer to explicitly define the dependencies between the system states and permissions to access and modify system resources. To facilitate a systematic description and verification of the dynamic access rights, we propose a contract-based approach and then we demonstrate how to model and verify dynamic RBAC in Event-B. The approach is illustrated by a case study - a reporting management system.
引用
收藏
页码:48 / 63
页数:16
相关论文
共 50 条
  • [1] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [2] A logical approach to dynamic role-based access control
    Balbiani, Philippe
    Chevalier, Yannick
    El Houri, Marwa
    [J]. ARTIFICIAL INTELLIGENCE: METHODOLOGY, SYSTEMS, AND APPLICATIONS, 2008, 5253 : 194 - 208
  • [3] Early Validation and Verification of a Distributed Role-Based Access Control Model
    Zafar, Saad
    Colvin, Robert
    Winter, Kirsten
    Yatapanage, Nisansala
    Dromey, R. G.
    [J]. 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 430 - +
  • [4] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
  • [5] Automated Verification of Role-based Access Control Security Models Recovered from Dynamic Web Applications
    Alalfi, Manar H.
    Cordy, James R.
    Dean, Thomas R.
    [J]. 2012 14TH IEEE INTERNATIONAL SYMPOSIUM ON WEB SYSTEMS EVOLUTION (WSE), 2012, : 1 - 10
  • [6] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [7] Design and Implementation of Dynamic Menu Based on Role-Based Access Control
    Chen, Ying
    Yang, Fengyu
    [J]. MATERIALS PROCESSING AND MANUFACTURING III, PTS 1-4, 2013, 753-755 : 2990 - 2994
  • [8] Role-based access control in DCOM
    Ahn, GJ
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [9] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    [J]. COMPUTER, 2012, 45 (06) : 81 - 88
  • [10] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136