Abstract
We present an approach that uses special purpose role-based access control (RBAC) constraints to base certain access control decisions on context information. In our approach a context constraint is defined as a dynamic RBAC constraint that checks the actual values of one or more contextual attributes for predefined conditions. If these conditions are satisfied, the corresponding access request can be permitted. Accordingly, a conditional permission is an RBAC permission that is constrained by one or more context constraints. We present an engineering process for context constraints that is based on goal-oriented requirements engineering techniques, and describe how we extended the design and implementation of an existing RBAC service to enable the enforcement of context constraints. With our approach we aim to preserve the advantages of RBAC and offer an additional means for the definition and enforcement of fine-grained context-dependent access control policies.
- Adam, N., Atluri, V., Bertino, E., and Ferrari, E. 2002. A content-based authorization model for digital libraries. IEEE Trans. Knowledge Data Eng. 14, 2 (Mar/Apr).]] Google Scholar
- Ahn, G. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).]] Google Scholar
- Antón, A. 1996. Goal-based requirements analysis. In Proceedings of the IEEE International Conference on Requirements Engineering (ICRE).]] Google Scholar
- Apt, K., Blair, H., and Walker, A. 1988. Towards a theory of declarative knowledge. In Foundations of Deductive Databases and Logic Programming, J. Minker, ed. Morgan Kaufmann Publishers.]] Google Scholar
- Atluri, V. and Gal, A. 2002. An authorization model for temporal and derived data: Securing information portals. ACM Trans. Inf. Syst. Secur. 5, 1 (Feb.).]] Google Scholar
- Bacon, J., Lloyd, M., and Moody, K. 2001. Translating role-based access control policy within context. In Proceedings of the 2nd International Workshop on Policies for Distributed Systems and Networks (POLICY). Lecture Notes in Computer Science, 1995, Springer Verlag.]] Google Scholar
- Barkley, J., Beznosov, K., and Uppal, J. 1999. Supporting relationships in access control using role based access control. In Proceedings of ACM Workshop on Role Based Access Control.]] Google Scholar
- Belokosztolszki, A., Eyers, D., and Moody, K. 2003. Policy contexts: Controlling information flow in parameterised RBAC. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).]] Google Scholar
- Bertino, E., Bonatti, P., and Ferrari, E. 2001. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.).]] Google Scholar
- Bertino, E., Ferrari, E., and Atluri, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).]] Google Scholar
- Bharadwaj, V. and Baras, J. 2003. Towards automated negotiation of access control policies. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).]] Google Scholar
- Bray, T., Paoli, J., Sperberg-McQueen, C., Maler, E., and Yergeau, F. 2004. Extensible Markup Language (XML) version 1.0, 3rd edition. Available at http://www.w3.org/TR/REC-xml/. W3 Consortium Recommendation.]]Google Scholar
- Clark, J. and DeRose, S. 1999. XML Path Language (XPath). Available at http://www.w3.org/TR/xpath. W3 Consortium Recommendation.]]Google Scholar
- Cohen, E., Thomas, R., Winsborough, W., and Shands, D. 2002. Models for coalition-based access control (CBAC). In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., and Abowd, G. 2001. Securing context-aware applications using environment roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Denning, D. 1976. A lattice model of secure information flow. Commun. ACM 19, 5 (May).]] Google Scholar
- Dey, A. 2001. Understanding and using context. Personal and Ubiquitous Computing 5, 1.]] Google Scholar
- Edjlali, G., Acharya, A., and Chaudhary, V. 1998. History-based access control for mobile code. In Proceedings of the Fifth ACM Conference on Computer and Communications Security (CCS).]] Google Scholar
- Ferraiolo, D., Barkley, J., and Kuhn, D. 1999. A role-based access control model and reference implementation within a corporate Intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).]] Google Scholar
- Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R. 2001. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.).]] Google Scholar
- Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley.]] Google Scholar
- Georgiadis, C., Mavridis, I., Pangalos, G., and Thomas, R. 2001. Flexible team-based access control using contexts. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Giuri, L. and Iglio, P. 1997. Role templates for content-based access control. In Proceedings of the ACM Workshop on Role-Based Access Control.]] Google Scholar
- Guth, S., Neumann, G., and Strembeck, M. 2003. Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. In Proceedings of the 3rd ACM Workshop on Digital Rights Management (DRM).]] Google Scholar
- Jaeger, T. 1999. On the increasing importance of constraints. In Proceedings of the ACM Workshop on Role-Based Access Control.]] Google Scholar
- Jaeger, T., Prakash, A., Liedtke, J., and Islam, N. 1999. Flexible control of downloaded executable content. ACM Trans. Inf. Syst. Secur. 2, 2 (May).]] Google Scholar
- Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian, V. 2001. Flexible support for multiple access control policies. ACM Trans. Datab. Syst. 26, 2 (June).]] Google Scholar
- Jarke, M., Bui, X., and Carroll, J. 1998. Scenario management: An interdisciplinary approach. Requirements Engineering Journal 3, 3/4.]]Google Scholar
- Kalam, A. E., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., and Trouessin, G. 2003. Organization based access control. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).]] Google Scholar
- Kang, M., Park, J., and Froscher, J. 2001. Access control mechanisms for inter-organizational workflow. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Kim, W., Graupner, S., Sahai, A., Lenkov, D., Chudasama, C., Whedbee, S., Luo, Y., Desai, B., Mullings, H., and Wonng, P. 2002. Web E-speak: Facilitating web-based E-services. IEEE Multimedia 9, 1.]] Google Scholar
- Longstaff, J., Lockyer, M., Capper, G., and Thick, M. 2000. A model of accountability, confidentiality and override for healthcare and other applications. In Proceedings of the 5th ACM Workshop on Role-Based Access Control.]] Google Scholar
- McDaniel, P. 2003. On context in authorization policy. In Proceedings of the ACM Symposium on Access Control Models and Technologies.]] Google Scholar
- Myles, G., Friday, A., and Davies, N. 2003. Preserving privacy in environments with location-based applications. IEEE Pervasive Comput. 2, 1 (Jan.--Mar.).]] Google Scholar
- Neumann, G. and Strembeck, M. 2001. Design and implementation of a flexible RBAC-service in an object-oriented scripting language. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS).]] Google Scholar
- Neumann, G. and Strembeck, M. 2002. A Scenario-driven role engineering process for functional RBAC roles. In Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Neumann, G. and Zdun, U. 2000. XOTcl, an object-oriented scripting language. In Proceedings of Tcl2k: 7th USENIX Tcl/Tk Conference.]] Google Scholar
- Nitsche, U., Holbein, R., Morger, O., and Teufel, S. 1998. Realization of a context-dependent access control mechanism on a commercial platform. In Proceedings of the 14th International Information Security Conference (IFIP/SEC).]]Google Scholar
- Ousterhout, J. 1994. Tcl and the Tk Toolkit. Addison-Wesley.]] Google Scholar
- Phillips, C., Ting, T., and Demurjian, S. 2002. Information sharing and security in dynamic coalitions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Rolland, C., Grosz, G., and Kla, R. 1999. Experience with goal-scenario coupling in requirements engineering. In Proceedings of the IEEE International Symposium on Requirements Engineering (RE).]] Google Scholar
- Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.).]] Google Scholar
- Schmidt, A., Beigl, M., and Gellersen, H. 1999. There is more to context than location. Comput. Graphics 23, 6 (Dec.).]]Google Scholar
- Strembeck, M. 2004. Conflict checking of separation of duty constraints in RBAC---Implementation experiences. In Proceedings of the Conference on Software Engineering (SE 2004).]]Google Scholar
- Thomas, R. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Proceedings of the ACM Workshop on Role Based Access Control.]] Google Scholar
- Thomas, R. and Sandhu, R. 1997. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP WG11.3 Conference on Database Security.]] Google Scholar
- van Lamsweerde, A. 2001. Goal-oriented requirements engineering: A guided tour. In Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE).]] Google Scholar
- van Lamsweerde, A. and Letier, E. 2000. Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26, 10 (Oct.).]] Google Scholar
- Wang, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In Proceedings of the ACM Conference on Hypertext and Hypermedia.]] Google Scholar
- Warrior, J., McHenry, E., and McGee, K. 2003. They know where you are. IEEE Spectrum 40, 7 (July).]] Google Scholar
- Weiser, M. 1991. The computer for the 21st Century. Sci. Am. 265, 3 (Sep.).]]Google Scholar
- Weiser, M. 1993. Some computer science issues in ubiquitous computing. Commun. ACM 36, 7 (July).]] Google Scholar
- Wilikens, M., Feriti, S., Sanna, A., and Masera, M. 2002. A context-related authorization and access control method based on RBAC: A case study from the health care domain. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
- Wolf, R. and Schneider, M. 2003. Context-dependent access control for web-based collaboration environments with role-based approach. In Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. Lecture Notes in Computer Science, vol. 2776, Springer Verlag.]]Google Scholar
- Yao, W., Moody, K., and Bacon, J. 2001. A model of OASIS role-based access control and its support for active security. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google Scholar
Index Terms
- An integrated approach to engineer and enforce context constraints in RBAC environments
Recommendations
An approach to engineer and enforce context constraints in an RBAC environment
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologiesThis paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is defined as a dynamic RBAC constraint that checks the actual values of one ...
Configuring role-based access control to enforce mandatory and discretionary access control policies
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general ...
DW-RBAC: A formal security model of delegation and revocation in workflow systems
One reason workflow systems have been criticized as being inflexible is that they lack support for delegation. This paper shows how delegation can be introduced in a workflow system by extending the role-based access control (RBAC) model. The current ...
Comments