Security analysis for temporal role based access control

被引:9
|
作者
Uzun, Emre [1 ]
Atluri, Vijayalakshmi [1 ]
Vaidya, Jaideep [1 ]
Sural, Shamik [2 ]
Ferrara, Anna [3 ]
Parlato, Gennaro [4 ]
Madhusudan, P. [5 ]
机构
[1] Rutgers State Univ, Newark, NJ 08901 USA
[2] Indian Inst Technol, Kharagpur, W Bengal, India
[3] Univ Bristol, Bristol, Avon, England
[4] Univ Southampton, Southampton, Hants, England
[5] Univ Illinois, Urbana, IL 61801 USA
基金
美国国家科学基金会;
关键词
Access control; temporal RBAC; safety analysis; temporal role hierarchy;
D O I
10.3233/JCS-140510
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing restrictive and secure access to resources is a challenging and socially important problem. Among the many formal security models, Role Based Access Control (RBAC) has become the norm in many of today's organizations for enforcing security. For every model, it is necessary to analyze and prove that the corresponding system is secure. Such analysis helps understand the implications of security policies and helps organizations gain confidence on the control they have on resources while providing access, and devise and maintain policies. In this paper, we consider security analysis for the Temporal RBAC (TRBAC), one of the extensions of RBAC. The TRBAC considered in this paper allows temporal restrictions on roles themselves, userpermission assignments (UA), permission-role assignments (PA), as well as role hierarchies (RH). Towards this end, we first propose a suitable administrative model that governs changes to temporal policies. Then we propose our security analysis strategy, that essentially decomposes the temporal security analysis problem into smaller and more manageable RBAC security analysis sub-problems for which the existing RBAC security analysis tools can be employed. We then evaluate them from a practical perspective by evaluating their performance using simulated data sets.
引用
收藏
页码:961 / 996
页数:36
相关论文
共 50 条
  • [41] Security analysis of Mandatory Access Control Model
    Jiang, YX
    Lin, CC
    Yin, H
    Tan, ZX
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
  • [42] Security Analysis and Improvement of Femtocell Access Control
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Tso, Raylin
    Wu, Mu-En
    [J]. NETWORK AND SYSTEM SECURITY, 2014, 8792 : 223 - 232
  • [43] Security analysis of network access control implementations
    Cetin, F.
    Dagonnier, T.
    Oechslin, P.
    [J]. RELIABILITY, RISK AND SAFETY: THEORY AND APPLICATIONS VOLS 1-3, 2010, : 1907 - 1914
  • [44] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52
  • [45] Security Audit Based on Dynamic ACCESS CONTROL
    Li Weiwei
    Zhang Tao
    Lin Weimin
    Deng Song
    Shi Jian
    Wang Chen
    [J]. INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS, 2012, 127 : 787 - 793
  • [46] Specification and verification of constraints in role based access control for enterprise security system.
    Kolaczek, G
    [J]. TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 190 - 195
  • [47] Internet security: A novel role/object-based access control for digital libraries
    Chen, Su-Shing
    Choo, Chee-Yoong
    Chow, Randy Y.
    [J]. JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2006, 16 (02) : 87 - 103
  • [48] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [49] An Evaluation of Role Based Access Control Towards Easier Management Compared to Tight Security
    Habib, Muhammad Asif
    Ahmad, Mudassar
    Mahmood, Nasir
    Ashraf, Rehan
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS (ICFNDS '17), 2017,
  • [50] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558