Security analysis for temporal role based access control

被引:9
|
作者
Uzun, Emre [1 ]
Atluri, Vijayalakshmi [1 ]
Vaidya, Jaideep [1 ]
Sural, Shamik [2 ]
Ferrara, Anna [3 ]
Parlato, Gennaro [4 ]
Madhusudan, P. [5 ]
机构
[1] Rutgers State Univ, Newark, NJ 08901 USA
[2] Indian Inst Technol, Kharagpur, W Bengal, India
[3] Univ Bristol, Bristol, Avon, England
[4] Univ Southampton, Southampton, Hants, England
[5] Univ Illinois, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Access control; temporal RBAC; safety analysis; temporal role hierarchy;
D O I
10.3233/JCS-140510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today's organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of security policies and helps organizations gain confidence on the control they have on resources while providing access, and devise and maintain policies. In this paper, we consider security analysis for the Temporal RBAC (TRBAC), one of the extensions of RBAC. The TRBAC considered in this paper allows temporal restrictions on roles themselves, userpermission assignments (UA), permission-role assignments (PA), as well as role hierarchies (RH). Towards this end, we first propose a suitable administrative model that governs changes to temporal policies. Then we propose our security analysis strategy, that essentially decomposes the temporal security analysis problem into smaller and more manageable RBAC security analysis sub-problems for which the existing RBAC security analysis tools can be employed. We then evaluate them from a practical perspective by evaluating their performance using simulated data sets.
引用
收藏
页码:961 / 996
页数:36
相关论文
共 50 条
  • [1] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    [J]. ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [2] Research on Security Status Recovery in Temporal Role-Based Access Control System
    Yu Wanjun
    Wang Yong
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
  • [3] Security Analysis of Role-Based Access Control through Program Verification
    Ferrara, Anna Lisa
    Madhusudan, P.
    Parlato, Gennaro
    [J]. 2012 IEEE 25TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2012, : 113 - 125
  • [4] STRoBAC - Spatial Temporal Role Based Access Control
    Kim Tuyen Le Thi
    Tran Khanh Dang
    Kuonen, Pierre
    Drissi, Houda Chabbi
    [J]. COMPUTATIONAL COLLECTIVE INTELLIGENCE - TECHNOLOGIES AND APPLICATIONS, PT II, 2012, 7654 : 201 - 211
  • [5] Spatio-Temporal Role Based Access Control for Physical Access Control Systems
    Geepalla, Emsaieb
    Bordbar, Behzad
    Du, Xiaofeng
    [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2013, : 39 - 42
  • [6] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [7] A security quantitative analysis method for access control based on security entropy
    Che, Tian-Wei
    Ma, Jian-Feng
    Li, Na
    Wang, Chao
    [J]. International Journal of Network Security, 2015, 17 (05): : 517 - 521
  • [8] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [9] On the formalization and analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 399 - 452
  • [10] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852