skip to main content
10.1145/1102120.1102143acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Understanding and developing role-based administrative models

Published:07 November 2005Publication History

ABSTRACT

Access control data structures generally need to evolve over time in order to reflect changes to security policy and personnel. An administrative model defines the rules that control the state changes to an access control model and the data structures that model defines. We present a powerful framework for describing role-based administrative models. It is based on the concept of administrative domains and criteria that control state changes in order to preserve certain features of those domains. We define a number of different sets of criteria, each of which control the effect of state changes on the set of administrative domains and thereby lead to different role-based administrative models. Using this framework we are able to identify some unexpected connections between the ARBAC97 and RHA administrative models and to compare their respective properties. In doing so we are able to suggest some improvements to both models.

References

  1. Abrams, M., LaPadula, L., and Olson, I. M. Building generalized access control on UNIX. In Proceedings of Second USENIX UNIX Security Workshop/ (1990), pp. 65--70.Google ScholarGoogle Scholar
  2. American National Standards Institute. ANSI INCITS 359-2004 for Role Based Access Control, 2004.Google ScholarGoogle Scholar
  3. Bertino, E., Bonatti, P., and Ferrari, E. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (2001), 191--223. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Crampton, J. Authorization and antichains. PhD thesis, Birkbeck, University of London, London, England, 2002. Available from http://www.isg.rhul.ac.uk~jason.Google ScholarGoogle Scholar
  5. Crampton, J. Understanding and developing role-based administrative models. Tech. Rep. RHUL--MA--2005--6, Royal Holloway, University of London, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Crampton, J., and Loizou, G. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security 6, 2 (2003), 201--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Davey, B., and Priestley, H. Introduction to Lattices and Order. Cambridge University Press, Cambridge, United Kingdom, 1990.Google ScholarGoogle Scholar
  8. Ferraiolo, D., and Kuhn, D. Role-based access control. In Proceedings of the 15th NIST-NSA National Computer Security Conference (1992), pp. 554--563.Google ScholarGoogle Scholar
  9. Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4, 3 (2001), 224--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Harrison, M., Ruzzo, W., and Ullman, J. Protection in operating systems. Communications of the ACM 19, 8 (1976), 461--471. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Li, N., and Tripunitara, M. Security analysis in role-based access control. In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (2004), pp. 126--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Munawer, Q., and Sandhu, R. Simulation of the augmented typed access matrix model (ATAM) using roles. In Proceedings INFOSECU99 International Conference on Information Security (1999).Google ScholarGoogle Scholar
  13. Nyanchama, M., and Osborn, S. The role graph model and conflict of interest. ACM Transactions on Information and System Security 2, 1 (1999), 3--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sandhu, R. Role activation hierarchies. In Proceedings of Third ACM Workshop on Role-Based Access Control (1998), pp. 33--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sandhu, R., Bhamidipati, V., and Munawer, Q. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 1, 2 (1999), 105--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. Role-based access control models. IEEE Computer 29, 2 (1996), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Understanding and developing role-based administrative models

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
              November 2005
              422 pages
              ISBN:1595932267
              DOI:10.1145/1102120

              Copyright © 2005 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 7 November 2005

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,261of6,999submissions,18%

              Upcoming Conference

              CCS '24
              ACM SIGSAC Conference on Computer and Communications Security
              October 14 - 18, 2024
              Salt Lake City , UT , USA

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader