skip to main content
article

An integrated approach to engineer and enforce context constraints in RBAC environments

Published:01 August 2004Publication History
Skip Abstract Section

Abstract

We present an approach that uses special purpose role-based access control (RBAC) constraints to base certain access control decisions on context information. In our approach a context constraint is defined as a dynamic RBAC constraint that checks the actual values of one or more contextual attributes for predefined conditions. If these conditions are satisfied, the corresponding access request can be permitted. Accordingly, a conditional permission is an RBAC permission that is constrained by one or more context constraints. We present an engineering process for context constraints that is based on goal-oriented requirements engineering techniques, and describe how we extended the design and implementation of an existing RBAC service to enable the enforcement of context constraints. With our approach we aim to preserve the advantages of RBAC and offer an additional means for the definition and enforcement of fine-grained context-dependent access control policies.

References

  1. Adam, N., Atluri, V., Bertino, E., and Ferrari, E. 2002. A content-based authorization model for digital libraries. IEEE Trans. Knowledge Data Eng. 14, 2 (Mar/Apr).]] Google ScholarGoogle Scholar
  2. Ahn, G. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).]] Google ScholarGoogle Scholar
  3. Antón, A. 1996. Goal-based requirements analysis. In Proceedings of the IEEE International Conference on Requirements Engineering (ICRE).]] Google ScholarGoogle Scholar
  4. Apt, K., Blair, H., and Walker, A. 1988. Towards a theory of declarative knowledge. In Foundations of Deductive Databases and Logic Programming, J. Minker, ed. Morgan Kaufmann Publishers.]] Google ScholarGoogle Scholar
  5. Atluri, V. and Gal, A. 2002. An authorization model for temporal and derived data: Securing information portals. ACM Trans. Inf. Syst. Secur. 5, 1 (Feb.).]] Google ScholarGoogle Scholar
  6. Bacon, J., Lloyd, M., and Moody, K. 2001. Translating role-based access control policy within context. In Proceedings of the 2nd International Workshop on Policies for Distributed Systems and Networks (POLICY). Lecture Notes in Computer Science, 1995, Springer Verlag.]] Google ScholarGoogle Scholar
  7. Barkley, J., Beznosov, K., and Uppal, J. 1999. Supporting relationships in access control using role based access control. In Proceedings of ACM Workshop on Role Based Access Control.]] Google ScholarGoogle Scholar
  8. Belokosztolszki, A., Eyers, D., and Moody, K. 2003. Policy contexts: Controlling information flow in parameterised RBAC. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).]] Google ScholarGoogle Scholar
  9. Bertino, E., Bonatti, P., and Ferrari, E. 2001. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.).]] Google ScholarGoogle Scholar
  10. Bertino, E., Ferrari, E., and Atluri, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).]] Google ScholarGoogle Scholar
  11. Bharadwaj, V. and Baras, J. 2003. Towards automated negotiation of access control policies. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).]] Google ScholarGoogle Scholar
  12. Bray, T., Paoli, J., Sperberg-McQueen, C., Maler, E., and Yergeau, F. 2004. Extensible Markup Language (XML) version 1.0, 3rd edition. Available at http://www.w3.org/TR/REC-xml/. W3 Consortium Recommendation.]]Google ScholarGoogle Scholar
  13. Clark, J. and DeRose, S. 1999. XML Path Language (XPath). Available at http://www.w3.org/TR/xpath. W3 Consortium Recommendation.]]Google ScholarGoogle Scholar
  14. Cohen, E., Thomas, R., Winsborough, W., and Shands, D. 2002. Models for coalition-based access control (CBAC). In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  15. Covington, M., Long, W., Srinivasan, S., Dey, A., Ahamad, M., and Abowd, G. 2001. Securing context-aware applications using environment roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  16. Denning, D. 1976. A lattice model of secure information flow. Commun. ACM 19, 5 (May).]] Google ScholarGoogle Scholar
  17. Dey, A. 2001. Understanding and using context. Personal and Ubiquitous Computing 5, 1.]] Google ScholarGoogle Scholar
  18. Edjlali, G., Acharya, A., and Chaudhary, V. 1998. History-based access control for mobile code. In Proceedings of the Fifth ACM Conference on Computer and Communications Security (CCS).]] Google ScholarGoogle Scholar
  19. Ferraiolo, D., Barkley, J., and Kuhn, D. 1999. A role-based access control model and reference implementation within a corporate Intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).]] Google ScholarGoogle Scholar
  20. Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R. 2001. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.).]] Google ScholarGoogle Scholar
  21. Gamma, E., Helm, R., Johnson, R., and Vlissides, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley.]] Google ScholarGoogle Scholar
  22. Georgiadis, C., Mavridis, I., Pangalos, G., and Thomas, R. 2001. Flexible team-based access control using contexts. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  23. Giuri, L. and Iglio, P. 1997. Role templates for content-based access control. In Proceedings of the ACM Workshop on Role-Based Access Control.]] Google ScholarGoogle Scholar
  24. Guth, S., Neumann, G., and Strembeck, M. 2003. Experiences with the enforcement of access rights extracted from ODRL-based digital contracts. In Proceedings of the 3rd ACM Workshop on Digital Rights Management (DRM).]] Google ScholarGoogle Scholar
  25. Jaeger, T. 1999. On the increasing importance of constraints. In Proceedings of the ACM Workshop on Role-Based Access Control.]] Google ScholarGoogle Scholar
  26. Jaeger, T., Prakash, A., Liedtke, J., and Islam, N. 1999. Flexible control of downloaded executable content. ACM Trans. Inf. Syst. Secur. 2, 2 (May).]] Google ScholarGoogle Scholar
  27. Jajodia, S., Samarati, P., Sapino, M., and Subrahmanian, V. 2001. Flexible support for multiple access control policies. ACM Trans. Datab. Syst. 26, 2 (June).]] Google ScholarGoogle Scholar
  28. Jarke, M., Bui, X., and Carroll, J. 1998. Scenario management: An interdisciplinary approach. Requirements Engineering Journal 3, 3/4.]]Google ScholarGoogle Scholar
  29. Kalam, A. E., Baida, R. E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., and Trouessin, G. 2003. Organization based access control. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).]] Google ScholarGoogle Scholar
  30. Kang, M., Park, J., and Froscher, J. 2001. Access control mechanisms for inter-organizational workflow. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  31. Kim, W., Graupner, S., Sahai, A., Lenkov, D., Chudasama, C., Whedbee, S., Luo, Y., Desai, B., Mullings, H., and Wonng, P. 2002. Web E-speak: Facilitating web-based E-services. IEEE Multimedia 9, 1.]] Google ScholarGoogle Scholar
  32. Longstaff, J., Lockyer, M., Capper, G., and Thick, M. 2000. A model of accountability, confidentiality and override for healthcare and other applications. In Proceedings of the 5th ACM Workshop on Role-Based Access Control.]] Google ScholarGoogle Scholar
  33. McDaniel, P. 2003. On context in authorization policy. In Proceedings of the ACM Symposium on Access Control Models and Technologies.]] Google ScholarGoogle Scholar
  34. Myles, G., Friday, A., and Davies, N. 2003. Preserving privacy in environments with location-based applications. IEEE Pervasive Comput. 2, 1 (Jan.--Mar.).]] Google ScholarGoogle Scholar
  35. Neumann, G. and Strembeck, M. 2001. Design and implementation of a flexible RBAC-service in an object-oriented scripting language. In Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS).]] Google ScholarGoogle Scholar
  36. Neumann, G. and Strembeck, M. 2002. A Scenario-driven role engineering process for functional RBAC roles. In Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  37. Neumann, G. and Zdun, U. 2000. XOTcl, an object-oriented scripting language. In Proceedings of Tcl2k: 7th USENIX Tcl/Tk Conference.]] Google ScholarGoogle Scholar
  38. Nitsche, U., Holbein, R., Morger, O., and Teufel, S. 1998. Realization of a context-dependent access control mechanism on a commercial platform. In Proceedings of the 14th International Information Security Conference (IFIP/SEC).]]Google ScholarGoogle Scholar
  39. Ousterhout, J. 1994. Tcl and the Tk Toolkit. Addison-Wesley.]] Google ScholarGoogle Scholar
  40. Phillips, C., Ting, T., and Demurjian, S. 2002. Information sharing and security in dynamic coalitions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  41. Rolland, C., Grosz, G., and Kla, R. 1999. Experience with goal-scenario coupling in requirements engineering. In Proceedings of the IEEE International Symposium on Requirements Engineering (RE).]] Google ScholarGoogle Scholar
  42. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.).]] Google ScholarGoogle Scholar
  43. Schmidt, A., Beigl, M., and Gellersen, H. 1999. There is more to context than location. Comput. Graphics 23, 6 (Dec.).]]Google ScholarGoogle Scholar
  44. Strembeck, M. 2004. Conflict checking of separation of duty constraints in RBAC---Implementation experiences. In Proceedings of the Conference on Software Engineering (SE 2004).]]Google ScholarGoogle Scholar
  45. Thomas, R. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Proceedings of the ACM Workshop on Role Based Access Control.]] Google ScholarGoogle Scholar
  46. Thomas, R. and Sandhu, R. 1997. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP WG11.3 Conference on Database Security.]] Google ScholarGoogle Scholar
  47. van Lamsweerde, A. 2001. Goal-oriented requirements engineering: A guided tour. In Proceedings of the 5th IEEE International Symposium on Requirements Engineering (RE).]] Google ScholarGoogle Scholar
  48. van Lamsweerde, A. and Letier, E. 2000. Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26, 10 (Oct.).]] Google ScholarGoogle Scholar
  49. Wang, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In Proceedings of the ACM Conference on Hypertext and Hypermedia.]] Google ScholarGoogle Scholar
  50. Warrior, J., McHenry, E., and McGee, K. 2003. They know where you are. IEEE Spectrum 40, 7 (July).]] Google ScholarGoogle Scholar
  51. Weiser, M. 1991. The computer for the 21st Century. Sci. Am. 265, 3 (Sep.).]]Google ScholarGoogle Scholar
  52. Weiser, M. 1993. Some computer science issues in ubiquitous computing. Commun. ACM 36, 7 (July).]] Google ScholarGoogle Scholar
  53. Wilikens, M., Feriti, S., Sanna, A., and Masera, M. 2002. A context-related authorization and access control method based on RBAC: A case study from the health care domain. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar
  54. Wolf, R. and Schneider, M. 2003. Context-dependent access control for web-based collaboration environments with role-based approach. In Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. Lecture Notes in Computer Science, vol. 2776, Springer Verlag.]]Google ScholarGoogle Scholar
  55. Yao, W., Moody, K., and Bacon, J. 2001. A model of OASIS role-based access control and its support for active security. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).]] Google ScholarGoogle Scholar

Index Terms

  1. An integrated approach to engineer and enforce context constraints in RBAC environments

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader