DS RBAC - Dynamic Sessions in Role Based Access Control

被引:0
|
作者
Muehlbacher, Joerg R. [1 ]
Praher, Christian [1 ]
机构
[1] Johannes Kepler Univ Linz, Linz, Austria
关键词
security; Role Based Access Control; ANSI RBAC; session; least privilege;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasingly momentum. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI) in 2004. While the concept of sessions specified in the ANSI RBAC standard allows for differentiated role selections according to tasks that have to be performed by users, it is very likely that more roles will be activated in a session than are effectively needed to perform the intended activity. Dynamic Sessions in RBAC (DS RBAC) is an extension to the existing RBAC ANSI standard that dynamically deactivates roles in a session if they are not exercised for a certain period of time. This allows for the selection of an outer-shell of possibly needed permissions at the initation of a session through a user, while adhering to the principle of least privilege by automatically reducing the effective permission space to those roles really exercised in the session. Analogous to the working set model known from virtual memory, only the minimal roles containing permissions recently exercised by the user are left in a session in the DS RBAC model. If the user tries to access a role that has aged out due to inactivity, a role fault occurs. A role fault can be resolved by the role fault handler that is responsible for re-activating the expired role. As will be presented in this paper, role re-activation may be subject to constraints that have to be fulfilled by the user in order to re-access the aged role.
引用
收藏
页码:538 / 554
页数:17
相关论文
共 50 条
  • [1] Permission Based Implementation of Dynamic Separation of Duty (DSD) in Role Based Access Control (RBAC)
    Habib, Muhammad Asif
    Mahmood, Nasir
    Shahid, Muhammad
    Aftab, Muhammad Umar
    Ahmad, Uzair
    Faisal, Ch. Muhammad Nadeem
    [J]. 2014 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2014,
  • [2] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [3] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    [J]. LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [4] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami, Garsha
    [J]. Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
  • [5] A Novel Role-Based-Access-Control(RBAC) Framework and Application
    Zhou, Yanjie
    Wen, Min
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY, 2015, 30 : 207 - 210
  • [6] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [7] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
  • [8] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
  • [9] I-RBAC: An identity& role based access control model
    Wang, Jin
    Li, Qiang
    Li, Daxing
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION, VOLS 1-7, 2007, : 1176 - +
  • [10] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239