A legal information flow (LIF) scheduler based on role-based access control model

被引:29
|
作者
Enokido, Tomoya [1 ]
Barolli, Valbona [2 ]
Takizawa, Makoto [2 ]
机构
[1] Rissho Univ, Fac Business Adm, Shinagawa Ku, Tokyo 1418602, Japan
[2] Tokyo Denki Univ, Dept Syst & Comp Engn, Hiki, Saitama 3500394, Japan
关键词
Information flow; Role-based access control model; Concurrency control; Security; Transaction;
D O I
10.1016/j.csi.2008.03.013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Information systems have to be consistent and secure in presence of multiple conflicting transactions. The role-based access control (RBAC) model is widely used to keep information systems consistent and secure. A role shows a job function in an enterprise and is a set of access rights (permissions). Here, a subject s is allowed to issue a method op to an object o only if an access right < o, op > is included in the roles granted to the subject s. A subject is granted one or more than one role and issues a transaction to multiple objects. The transaction is assigned with some roles of the subject which is referred to as purpose. Even if every access request issued by every subject is authorized in the roles, illegal information flow might occur as well known confinement problem. In this paper, we define a legal information flow (LIF) relation (R-1 <=(1) R-2) among a pair of role families R-1 and R-2 to prevent illegal information flow. Here, an LIF relation R-1 <=(1) R-2 shows that no illegal information flow occur if a transaction T-1 with a role family R-1 is performed prior to another transaction T-2 with a role family R-2. In addition, it is significant to discuss which transaction to be performed prior to another transaction if the both transactions manipulate the same object in a conflicting way. In this paper, we define a significantly precedent relation R-1 <=(1) R-2 among role families R-1 and R-2 which implies that the role family R-2 is more significant than R-1. Suppose a pair of transactions T-1 and T-2 with role families R-1 and R-2 issue conflicting methods op(1) and op(2), respectively, to an object o. If R-1 <=(s) R-2, op(2) is performed on the object o prior to op(1). The more significant a transaction is, the more prior it is performed. We discuss a legal information flow (LIF) scheduler to synchronize transactions so as to prevent illegal information flow and to serialize conflicting methods from multiple transactions in terms of significancy and information flow relation of roles families. We evaluate the LIF scheduler in terms of how much illegal information flow can be prevented compared with the other scheduler. (C) 2008 Published by Elsevier B.V.
引用
收藏
页码:906 / 912
页数:7
相关论文
共 50 条
  • [31] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [32] Practical Role-Based Access Control
    Galante, Victoria
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [33] Generalized Role-Based Access Control
    Moyer, MJ
    Ahamad, M
    [J]. 21ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2001, : 391 - 398
  • [34] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2008, 7 (02) : 123 - 136
  • [35] Fuzzy Role-Based Access Control
    Martinez-Garcia, Carles
    Navarro-Arribas, Guillermo
    Borrell, Joan
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (10) : 483 - 487
  • [36] Migrating to role-based access control
    Brooks, K
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 71 - 81
  • [37] Study of Role-based Access Control
    Cao Yonghui
    [J]. EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5209 - 5212
  • [38] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [39] Spatial role-based access control model for wireless networks
    Hansen, F
    Oleshchuk, V
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2093 - 2097
  • [40] An Extended Role-Based Access Control Model for CSCW Systems
    Chen, Bing
    [J]. MACHINING AND ADVANCED MANUFACTURING TECHNOLOGY X, 2010, 431-432 : 577 - 582