Modelling and Verification of Dynamic Role-Based Access Control

被引:3
|
作者
Vistbakka, Inna [1 ]
Troubitsyna, Elena [1 ,2 ]
机构
[1] Abo Akad Univ, Turku, Finland
[2] KTH, Stockholm, Sweden
关键词
D O I
10.1007/978-3-030-00359-3_4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controlling access to resources is essential for ensuring correctness of system functioning. Role-Based Access Control (RBAC) is a popular authorisation model that regulates the user's rights to manage system resources based on the user's role. In this paper, we extend the traditional static approach to defining RBAC and propose as well as formalise a dynamic RBAC model. It allows a designer to explicitly define the dependencies between the system states and permissions to access and modify system resources. To facilitate a systematic description and verification of the dynamic access rights, we propose a contract-based approach and then we demonstrate how to model and verify dynamic RBAC in Event-B. The approach is illustrated by a case study - a reporting management system.
引用
收藏
页码:48 / 63
页数:16
相关论文
共 50 条
  • [21] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [22] dRBAC: Distributed role-based access control for dynamic coalition environments
    Freudenthal, E
    Pesin, T
    Port, L
    Keenan, E
    Karamcheti, V
    [J]. 22ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2002, : 411 - 420
  • [23] A role-based access control policy verification framework for real-time systems
    Shafiq, B
    Masood, A
    Joshi, J
    Ghafoor, A
    [J]. WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings, 2005, : 13 - 20
  • [24] Dynamic Optimization of Role Concepts for Role-Based Access Control Using Evolutionary Algorithms
    Anderer S.
    Kempter T.
    Scheuermann B.
    Mostaghim S.
    [J]. SN Computer Science, 4 (4)
  • [25] Modeling, conflict detection, and verification of a new virtualization role-based access control framework
    Luo, Yang
    Xia, Chunhe
    Lv, Liangshuang
    Wei, Zhao
    Li, Yazhuo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1904 - 1925
  • [26] An attributable role-based access control for healthcare
    Schwartmann, D
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [27] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [28] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [29] Dynamic Role-Based Access Control for Web services using context and trust
    Tan W.
    Xu Y.
    Zhang T.
    Wen X.
    Cui L.
    Jiang C.
    [J]. International Journal of Digital Content Technology and its Applications, 2011, 5 (07) : 121 - 127
  • [30] A Role-Based Access Control Model that Supports Authorization with The Combination of Static and Dynamic
    Li, Liangyu
    Liu, Yuanning
    Zhu, Xiaodong
    Huang, Biao
    Wang, Youwei
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 28 : 979 - 982