A distributed calculus for role-based access control

被引:9
|
作者
Braghin, C [1 ]
Gorla, D [1 ]
Sassone, V [1 ]
机构
[1] Univ Ca Foscari, Dip Informat, Venice, Italy
关键词
D O I
10.1109/CSFW.2004.1310731
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complexity and cost of security administration by interposing the notion of role in the assignment of permissions to users. In this paper we present a formal framework relying on an extension of the pi calculus to study the behavior of concurrent systems in a RBAC scenario. We define a type system ensuring that the specified policy is respected during computations, and a bisimulation to equate systems. The theory is then applied to three meaningful examples, namely finding the 'minimal' policy to run a given system, refining a system to be run under a given policy (whenever possible), and minimizing the number of users in a given system without changing the overall behavior.
引用
收藏
页码:48 / 60
页数:13
相关论文
共 50 条
  • [1] Role-based access control for a distributed calculus
    Braghin, Chiara
    Gorla, Daniele
    Sassone, Vladimiro
    [J]. JOURNAL OF COMPUTER SECURITY, 2006, 14 (02) : 113 - 155
  • [2] Distributed Role-based Access Control for Coaliagion Application
    HONG Fan ZHU Xian XING GuanglinHONG Fan
    [J]. Geo-spatial Information Science, 2005, (02) : 138 - 143
  • [3] Distributed Role-based Access Control for Coaliagion Application
    Hong Fan
    Zhu Xian
    Xing Guanglin
    [J]. GEO-SPATIAL INFORMATION SCIENCE, 2005, 8 (02) : 138 - 143
  • [4] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    [J]. 2003, Huazhong University of Science and Technology (31):
  • [5] Role-based access control for CORBA distributed object systems
    Obelheiro, RR
    Fraga, JS
    [J]. PROCEEDINGS OF THE SEVENTH IEEE INTERNATIONAL WORKSHOP ON OBJECT-ORIENTED REAL-TIME DEPENDABLE SYSTEMS, 2002, : 53 - 60
  • [6] Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control
    Bloom, Gedare
    Simha, Rahul
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 5 - 15
  • [7] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [8] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [9] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [10] Early Validation and Verification of a Distributed Role-Based Access Control Model
    Zafar, Saad
    Colvin, Robert
    Winter, Kirsten
    Yatapanage, Nisansala
    Dromey, R. G.
    [J]. 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 430 - +