skip to main content
10.1145/1626195.1626217acmconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A UML profile for role-based access control

Authors Info & Claims
Published:06 October 2009Publication History

ABSTRACT

When building an access control aware system, integrating access control specifications into the development process is problematic. Even if security modeling is structured at the early phases of development, security mechanisms are placed into the system at the final phases. This late integration affects security and maintainability of the resulting system in a bad way. In this paper, we present a solution for this problem. We propose a Unified Modeling Language (UML) Profile for Role-Based Access Control (RBAC), with which access control specifications can be modeled graphically together with problem domain specifications from the beginning of the design phase, making it possible to extend security integration over entire development process. We employed significant RBAC constraints like static and dynamic separation of duties into the profile and introduced how Object Constraint Language (OCL) is used to validate well-formedness and meaning of information models against the RBAC.

References

  1. Ahn, G., and Shin, M.E. 2001. Role-Based Authorization Constraints Specification Using Object Constraint Language. In Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2001, 157--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. American National Standard for Information Technology, 2004. Role Based Access Control, ANSI INCITS 359-2004.Google ScholarGoogle Scholar
  3. Basin, D., Doser, J., and Lodderstedt, T. 2006. Model Driven Security: From UML Models to Access Control Infrastructures. ACM Transactions on Software Engineering and Methodology, Vol.15, No.1, 2006, 39--91. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bell, D.E., and LaPadula, L.J. 1976. Secure Computer System: Unified Exposition and Multics Interpretation. MTR-2997 Rev. 1, Bedford, MA: The Mitre Corporation, March.Google ScholarGoogle Scholar
  5. Brewer, D., and Nash, M. 1989. The Chinese Wall Security Policy. In Proceedings of the 1989 IEEE Symposium on Security and Privacy. IEEE C.S. Press, 206--214.Google ScholarGoogle Scholar
  6. Cirit, C., and Buzluca, F. 2009. A UML Profile for RBAC, in XMI format = http://www.buzluca.info/rbac/RBAC.profile.xmiGoogle ScholarGoogle Scholar
  7. Clark, D. D., and Wilson, D. R. 1987. A Comparison of Commercial and Military Computer Security Policies. In Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy. IEEE Press, 184--194.Google ScholarGoogle Scholar
  8. Ferraiolo, D., and Kuhn, R. 1992. Role-Based Access Control. In Proceedings of the 15th NIST-NSA National Computer Security Conference, 554--563.Google ScholarGoogle Scholar
  9. Ferraiolo, D., Kuhn, R., and Chandramouli, R. 2007. Role-Based Access Control, Second Edition. Artech House, Information Security and Privacy Series. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ferraiolo, D., Kuhn, R., and Sandhu, R. 2007. RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control". IEEE Security and Privacy, Vol. 5, No. 6, Nov./Dec. 2007, 51--53. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Fuentes-Fernández, L., and Vallecillo-Moreno, A. 2004. An Introduction to UML Profiles. UPGRADE, European Journal for the Informatics Professional Vol. 5, No. 2, 5--13.Google ScholarGoogle Scholar
  12. Jürjens, J. 2002. UMLsec: Extending UML for Secure Systems Development. In Proceedings of the 5th International Conference on the Unified Modeling Languages, October 2002, 412--425. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jin, X. 2006. Applying Model Driven Architecture Approach to Model Role Based Access Control System. Thesis (M.Sc.)--University of Ottawa, 2006.Google ScholarGoogle Scholar
  14. Object Management Group, 2003. MDA Guide Version 1.0.1 (Jun. 2003). http://www.omg.org/cgi-bin/doc?omg/03-06-01Google ScholarGoogle Scholar
  15. Object Management Group, 2006. Meta Object Facility (MOF) Core Specification, OMG Available Specification, Ver. 2.0 (Jan. 2006). http://www.omg.org/spec/MOF/2.0/Google ScholarGoogle Scholar
  16. Object Management Group, 2007. MOF 2.0/XMI Mapping, OMG Available Specification, Version 2.1.1. (Dec. 2007) http://www.omg.org/cgi-bin/doc?formal/2007-12-01Google ScholarGoogle Scholar
  17. Object Management Group, 2006. Object Constraint Language, OMG Available Specification, Version 2.0 (May. 2006). http://www.omg.org/spec/OCL/2.0/Google ScholarGoogle Scholar
  18. Object Management Group, 2009. OMG Unified Modeling Language (OMG UML), Superstructure, Version 2.2 (Feb. 2009). http://www.omg.org/cgi-bin/doc?formal/09-02-02Google ScholarGoogle Scholar
  19. Object Management Group, 2002. UML Profile for CORBA Specification, Version 1.0 (Apr. 2002). http://www.omg.org/cgi-bin/doc?formal/02-04-01Google ScholarGoogle Scholar
  20. Object Management Group, 2005. UML Testing Profile, Version 1.0 (Jul. 2005). http://www.omg.org/cgi-bin/doc?formal/05-07-07Google ScholarGoogle Scholar
  21. Organization for the Advancement of Structured Information Standards, 2005. Core: eXtensible Access Control Markup Language (XACML) Version 2.0 (Feb. 2005). http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdfGoogle ScholarGoogle Scholar
  22. Ray, I., Li, N., France, R., and Kim, D. 2004. Using UML to Visualize Role-Based Access Control Constraints. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004, 115--124. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Shin, M.E., and Ahn, G. 2000. UML-Based Representation of Role-Based Access Control. In Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000, 195--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Wang, H., Zhang, Y., Cao, J., and Yang, J. 2004. Specifying Role-Based Access Constraints with Object Constraint Language. APWeb 2004, LNCS Vol. 3007, Springer Berlin / Heidelberg, 687--696.Google ScholarGoogle Scholar

Index Terms

  1. A UML profile for role-based access control

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIN '09: Proceedings of the 2nd international conference on Security of information and networks
          October 2009
          322 pages
          ISBN:9781605584126
          DOI:10.1145/1626195

          Copyright © 2009 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 6 October 2009

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate102of289submissions,35%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader