skip to main content
article
Free Access

A role-based access control model and reference implementation within a corporate intranet

Authors Info & Claims
Published:01 February 1999Publication History
Skip Abstract Section

Abstract

This paper describes NIST's enhanced RBAC model and our approach to designing and implementing RBAC features for networked Web servers. The RBAC model formalized in this paper is based on the properties that were first described in Ferraiolo and Kuhn [1992] and Ferraiolo et al. [1995], with adjustments resulting from experience gained by prototype implementations, market analysis, and observations made by Jansen [1988] and Hoffman [1996]. The implementation of RBAC for the Web (RBAC/Web) provides an alternative to the conventional means of administering and enforcing authorization policy on a server-by-server basis. RBAC/Web provides administrators with a means of managing authorization data at the enterprise level, in a manner consistent with the current set of laws, regulations, and practices.

References

  1. BARKLEY, J. AND CINCOTTA, A. 1998. Managing role/permission relationships using object access types. In Proceedings of the 3rd ACM Workshop on Role-Based Access Control (RBAC, Fairfax, VA, Oct. 22-23). ACM Press, New York, NY, 73-80. Google ScholarGoogle Scholar
  2. FERRAIOLO, D. AND KUHN, D. R. 1992. Role based access control. In Proceedings of the 15th Annual Conference on National Computer Security. National Institute of Standards and Technology, Gaithersburg, MD, 554-563.Google ScholarGoogle Scholar
  3. FERRAIOLO, D., CUGINI, J., AND KUHN, D. R. 1995. Role based access control: Features and motivations. In Proceedings of the 11th Annual Conference on Computer Security Applications. IEEE Computer Society Press, Los Alamitos, CA, 241-248.Google ScholarGoogle Scholar
  4. FERRAIOLO, D. F., GILBERT, D. M., AND LYNCH, N. 1993. An examination of federal and commercial access control policy needs. In Proceedings of the 16th National Conference on Computer Security (Baltimore, MD, Sept. 20-23). National Institute of Standards and Technology, Gaithersburg, MD, 107-116.Google ScholarGoogle Scholar
  5. FEINSTEIN, H. L. 1995. Final report: NIST small business innovative research (SBIR) grant: Role based access control: Phase 1. SETA Corporation. SETA Corporation.Google ScholarGoogle Scholar
  6. GAVRILA, S. AND BARKLEY, J. 1998. Formal specification for role-based access control user/role and role/role relationship management. In Proceedings of the 3rd ACM Workshop on Role-Based Access Control (RBAC, Fairfax, VA, Oct. 22-23). ACM Press, New York, NY, 81-90. Google ScholarGoogle Scholar
  7. HOFFMAN, J. 1997. Implementing RBAC on type enforced systems. In Proceedings of the 13th Annual Conference on Computer Security Applications. IEEE Computer Society Press, Los Alamitos, CA, 158-163. Google ScholarGoogle Scholar
  8. JANSEN, W.A. 1988. Revised model for role based access control. NIST-IR 6192. National Institute of Standards and Technology, Gaithersburg, MD.Google ScholarGoogle Scholar
  9. KUHN, D. R. 1997. Mutual exclusion as a means of implementing separation of duty requirements in role-based access control systems. In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (Fairfax, VA, Nov. 6-7). ACM Press, New York, NY, 23-30. Google ScholarGoogle Scholar
  10. NYANCHAMA, M. AND OSBORN, S. L. 1994. Access rights administration in role-based security systems. In Proceedings of the IFIP Working Group 11.3 Working Conference on Database Security. Elsevier North-Holland, Inc., Amsterdam, The Netherlands. Google ScholarGoogle Scholar
  11. SANDHU, R., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. SANDHU, R. AND MUNAWER, Q. 1998. How to do discretionary access control using rules. In Proceedings of the 3rd ACM Workshop on Role-Based Access Control (RBAC, Fairfax, VA, Oct. 22-23). ACM Press, New York, NY, 47-54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. SANDHU, R. 1998. Role activation hierarchies. In Proceedings of the 3rd ACM Workshop on Role-Based Access Control (RBAC, Fairfax, VA, Oct. 22-23). ACM Press, New York, NY, 33-42. Google ScholarGoogle Scholar
  14. SANDHU, R., BHAMIDIPATI, V., COYNE, E., GANTA, S., AND YOUMAN, C. 1997. The ARBAC97 model for role-based administration of roles: Preliminary description and model. In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (Fairfax, VA, Nov. 6-7). ACM Press, New York, NY, 41-54. Google ScholarGoogle Scholar
  15. SIMON, R. AND ZURKO, M. E. 1997. Separation of duty in role based access control environments. In Proceedings of the l Oth IEEE Workshop on Computer Security Foundations (Rockport, MA, June 10-12). IEEE Computer Society Press, Los Alamitos, CA, 183-194. Google ScholarGoogle Scholar
  16. VON SOLMS, S. H. AND VAN DER MERVE, I. 1994. The management of computer security profiles using a role-oriented approach. Comput. Secur. 13, 8, 673-680. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A role-based access control model and reference implementation within a corporate intranet

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image ACM Transactions on Information and System Security
                ACM Transactions on Information and System Security  Volume 2, Issue 1
                Special issue on role-based access control
                Feb. 1999
                135 pages
                ISSN:1094-9224
                EISSN:1557-7406
                DOI:10.1145/300830
                Issue’s Table of Contents

                Copyright © 1999 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 February 1999
                Published in tissec Volume 2, Issue 1

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • article

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader