Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information

被引:1
|
作者
Khai Kim Quoc Dinh [1 ]
Tuan Duc Tran [1 ]
Anh Truong [1 ]
机构
[1] Ho Chi Minh City Univ Technol, Ho Chi Minh, Vietnam
来源
关键词
Computer security; Security analysis; Access control; Role-based access control; Spatial-temporal role-based access control;
D O I
10.1007/978-3-319-70004-5_17
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In many ubiquitous systems, Role-based Access Control (RBAC) is often used to restrict system access to authorized users. Spatial-Temporal Role-Based Access Control (STRBAC) is an extension of RBAC with contextual information (such as time and space) and has been adopted in real world applications. In a large organization, the RBAC policy may be complex and managed by multiple collaborative administrators to satisfy the evolving needs of the organization. Collaborative administrative actions may interact in unintended ways with each other's that may result in undesired effects to the security requirement of the organization. Analysis of these RBAC security concerns have been studied, especially with the Administrative Role-Based Access Control (ARBAC97). However, the analysis of its extension with contextual information, e.g., STRBAC, has not been considered in the literature. In this paper, we introduce a security analysis technique for the safety of Administrative STRBAC (ASTRBAC) Policies. We leverage First-Order Logic and Symbolic Model Checking (SMT) by translating ASTRBAC policy to decidable reachability problems. An extensive experimental evaluation confirms the correctness of our proposed solution, which supports finite ASTRBAC policies analysis without prior knowledge about the number of users.
引用
收藏
页码:243 / 261
页数:19
相关论文
共 50 条
  • [21] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [22] APPLICATION OF ROLE-BASED ACCESS CONTROL IN INFORMATION SYSTEM
    Zhu, Rui-Feng
    Ning, Jie
    Yu, Pei
    2012 INTERNATIONAL CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (LCWAMTIP), 2012, : 426 - 428
  • [23] An Administrative Model for Role-Based Access Control Using Hierarchical Namespace
    Xia, Luning
    Jing, Jiwu
    PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2006, SECTIONS 1-8, 2006, : 181 - 188
  • [24] A formal role-based access control model for security policies in multi-domain mobile networks
    Unal, D.
    Caglayan, M. U.
    COMPUTER NETWORKS, 2013, 57 (01) : 330 - 350
  • [25] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [26] Meta-policies for distributed role-based access control systems
    Belokosztolszki, A
    Moody, K
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 106 - 115
  • [27] Representation and reasoning on role-based access control policies with conceptual graphs
    Thion, Romuald
    Coulondre, Stephane
    CONCEPTUAL STRUCTURES: INSPIRATION AND APPLICATION, 2006, 4068 : 427 - 440
  • [28] A contextual role-based access control authorization model for electronic patient record
    Motta, GHMB
    Furuie, SS
    IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE, 2003, 7 (03): : 202 - 207
  • [29] Application of role-based access control in management information system
    Li, Jian
    Tang, Wenzhong
    Song, Changfu
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2003, 29 (06): : 534 - 538
  • [30] Edge-RMP: Minimizing administrative assignments for role-based access control
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Guo, Qi
    Lu, Haibing
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (02) : 211 - 235