Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information

被引:1
|
作者
Khai Kim Quoc Dinh [1 ]
Tuan Duc Tran [1 ]
Anh Truong [1 ]
机构
[1] Ho Chi Minh City Univ Technol, Ho Chi Minh, Vietnam
来源
关键词
Computer security; Security analysis; Access control; Role-based access control; Spatial-temporal role-based access control;
D O I
10.1007/978-3-319-70004-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many ubiquitous systems, Role-based Access Control (RBAC) is often used to restrict system access to authorized users. Spatial-Temporal Role-Based Access Control (STRBAC) is an extension of RBAC with contextual information (such as time and space) and has been adopted in real world applications. In a large organization, the RBAC policy may be complex and managed by multiple collaborative administrators to satisfy the evolving needs of the organization. Collaborative administrative actions may interact in unintended ways with each other's that may result in undesired effects to the security requirement of the organization. Analysis of these RBAC security concerns have been studied, especially with the Administrative Role-Based Access Control (ARBAC97). However, the analysis of its extension with contextual information, e.g., STRBAC, has not been considered in the literature. In this paper, we introduce a security analysis technique for the safety of Administrative STRBAC (ASTRBAC) Policies. We leverage First-Order Logic and Symbolic Model Checking (SMT) by translating ASTRBAC policy to decidable reachability problems. An extensive experimental evaluation confirms the correctness of our proposed solution, which supports finite ASTRBAC policies analysis without prior knowledge about the number of users.
引用
收藏
页码:243 / 261
页数:19
相关论文
共 50 条
  • [1] A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis
    Singh, Mahendra Pratap
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    INFORMATION SYSTEMS FRONTIERS, 2021, 26 (6) : 2255 - 2272
  • [2] VAC - Verifier of Administrative Role-Based Access Control Policies
    Ferrara, Anna Lisa
    Madhusudan, P.
    Nguyen, Truc L.
    Parlato, Gennaro
    COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 184 - 191
  • [3] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [4] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [5] Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving
    Armando, Alessandro
    Ranise, Silvio
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (04) : 309 - 352
  • [6] Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies
    Shahen, Jonathan
    Niu, Jianwei
    Tripunitara, Mahesh, V
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2349 - 2364
  • [7] Symbolic reachability analysis for parameterized administrative role-based access control
    Stoller, Scott D.
    Yang, Ping
    Gofman, Mikhail I.
    Ramakrishnan, C. R.
    COMPUTERS & SECURITY, 2011, 30 (2-3) : 148 - 164
  • [8] Analyzing and managing role-based access control policies
    Sohr, Karsten
    Drouineaud, Michael
    Ahn, Gail-Joon
    Gogolla, Martin
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (07) : 924 - 939
  • [9] Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control
    Ranise, Silvio
    Truong, Anh
    Armando, Alessandro
    PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 103 - 114
  • [10] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125