Security analysis for temporal role based access control

被引:9
|
作者
Uzun, Emre [1 ]
Atluri, Vijayalakshmi [1 ]
Vaidya, Jaideep [1 ]
Sural, Shamik [2 ]
Ferrara, Anna [3 ]
Parlato, Gennaro [4 ]
Madhusudan, P. [5 ]
机构
[1] Rutgers State Univ, Newark, NJ 08901 USA
[2] Indian Inst Technol, Kharagpur, W Bengal, India
[3] Univ Bristol, Bristol, Avon, England
[4] Univ Southampton, Southampton, Hants, England
[5] Univ Illinois, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Access control; temporal RBAC; safety analysis; temporal role hierarchy;
D O I
10.3233/JCS-140510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today's organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of security policies and helps organizations gain confidence on the control they have on resources while providing access, and devise and maintain policies. In this paper, we consider security analysis for the Temporal RBAC (TRBAC), one of the extensions of RBAC. The TRBAC considered in this paper allows temporal restrictions on roles themselves, userpermission assignments (UA), permission-role assignments (PA), as well as role hierarchies (RH). Towards this end, we first propose a suitable administrative model that governs changes to temporal policies. Then we propose our security analysis strategy, that essentially decomposes the temporal security analysis problem into smaller and more manageable RBAC security analysis sub-problems for which the existing RBAC security analysis tools can be employed. We then evaluate them from a practical perspective by evaluating their performance using simulated data sets.
引用
收藏
页码:961 / 996
页数:36
相关论文
共 50 条
  • [21] Security Analysis of Relationship-Based Access Control Policies
    Masoumzadeh, Amirreza
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
  • [22] Use of Role Based Access Control for Security-purpose Hypervisors
    Hirano, Manabu
    Chadwick, David W.
    Yamaguchi, Suguru
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1613 - 1619
  • [23] A spatio-temporal role-based access control model
    Ray, Indrakshi
    Toahchoodee, Manachai
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 211 - +
  • [24] A generalized temporal and spatial role-based access control model
    Chen H.-C.
    Wang S.-J.
    Wen J.-H.
    Huang Y.-F.
    Chen C.-W.
    [J]. Journal of Networks, 2010, 5 (08) : 912 - 920
  • [25] Conformance Testing of Temporal Role-Based Access Control Systems
    Masood, Ammar
    Ghafoor, Arif
    Mathur, Aditya
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (02) : 144 - 158
  • [26] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [27] THE EVALUATION AND COMPARATIVE ANALYSIS OF ROLE BASED ACCESS CONTROL AND ATTRIBUTE BASED ACCESS CONTROL MODEL
    Aftab, Muhammad Umar
    Qin, Zhiguang
    Zakria
    Ali, Safeer
    Pirah
    Khan, Jalaluddin
    [J]. 2018 15TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2018, : 35 - 39
  • [28] Spatial and Temporal Organization Based Access Control for Wireless Network as a Component of Security Requirements
    Belbergui, Chaimaa
    Elkamoun, Najib
    Hilal, Rachid
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 97 (03) : 4587 - 4619
  • [29] A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis
    Singh, Mahendra Pratap
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021,
  • [30] The application of security policy to role-based access control and the common data security architecture
    Lin, A
    Brown, R
    [J]. COMPUTER COMMUNICATIONS, 2000, 23 (17) : 1584 - 1593