skip to main content
10.1145/1368310.1368341acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

On spatio-temporal constraints and inheritance in role-based access control

Published:18 March 2008Publication History

ABSTRACT

Pervasive computing environments have created a requirement for spatial- and temporal-aware access control systems. Although temporal, spatial and spatio-temporal role-based access control (RBAC) models have been developed, a family of simple, expressive and flexible models that convincingly addresses the interaction between spatio-temporal constraints and inheritance in RBAC does not yet exist. In this paper, we define three spatio-temporal models based on RBAC96 the de facto standard for RBAC, and extend these models to include activation and usage hierarchies. These models provide different authorization semantics, varying in the extent to which RBAC entities and relations are constrained by spatio-temporal restrictions. We introduce the notion of trusted entities, which are used to selectively override certain spatio-temporal restrictions. We also demonstrate that our spatio-temporal models are consistent and compatible with RBAC96 and the ANSI-RBAC standard, in contrast to existing models. Finally, we propose four approaches to encoding spatio-temporal requirements in practical applications that permit access requests to be answered efficiently.

References

  1. American National Standards Institute. ANSI INCITS 359--2004 for Role Based Access Control, 2004.Google ScholarGoogle Scholar
  2. C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Supporting location-based conditions in access control policies. In Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pages 212--222, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security, 4(3):191--233, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca. GEO-RBAC: A spatially aware RBAC. In Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pages 29--37, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Chen and J. Crampton. Inter-domain role mapping and least privilege. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pages 157--162, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad, and G. D. Abowd. Securing context-aware applications using environment roles. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pages 10--20, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas. Flexible team-based access control using contexts. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pages 21--27, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Hansen and V. Oleshchuk. SRBAC: A spatial role-based access control model for mobile systems. In Proceedings of the 7th Nordic Workshop on Secure IT Systems, pages 129--141, 2003.Google ScholarGoogle Scholar
  9. J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 17(1):4--23, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Nyanchama and S. Osborn. The role graph model and conflict of interest. ACM Transactions on Information and System Security, 2(1):3--33, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. I. Ray and M. Kumar. Towards a location-based mandatory access control model. Computers & Security, 25(1):36--44, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. I. Ray and M. Toahchoodee. A spatio-temporal role-based access control model. In Proceedings of the 21th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, pages 211--226, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Sandhu. Role activation hierarchies. In Proceedings of the Third ACM Workshop on Role-Based Access Control, pages 33--40, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. M. Strembeck and G. Neumann. An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security, 7(3):392--427, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. K. Thomas. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Proceedings of the Second ACM Workshop on Role-Based Access Control, pages 13--19, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On spatio-temporal constraints and inheritance in role-based access control

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
        March 2008
        399 pages
        ISBN:9781595939791
        DOI:10.1145/1368310

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 March 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader