Role - based Authorization Constraints Speci
نویسندگان
چکیده
Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal motivations behind RBAC. Although the importance of constraints in RBAC has been recognized for a long time, they have not received much attention. In this paper, we introduce an intuitive formal language for specifying role-based authorization constraints named RCL 2000 including its basic elements, syntax, and semantics. We give soundness and completeness proofs for RCL 2000 relative to a restricted form of rst-order predicate logic. Also, we show how previously identiied role-based authorization constraints such as separation of duty (SOD) can be expressed in our language. Moreover, we show there are other signiicant SOD properties which have not been previously identiied in the literature. Our work shows that there are many alternate formulations of even the simplest SOD properties, with varying degree of exibility and assurance. Our language provides us a rigorous foundation for systematic study of role-based authorization constraints. 1. INTRODUCTION Role-based access control (RBAC) has emerged as a widely accepted alternative to classical discretionary and mandatory access controls Sandhu et al. 1996]. Several models of RBAC have been published and several commercial implementations are available. RBAC regulates the access of users to information and system resources on the basis of activities that users need to execute in the system. It requires the identiication of roles in the system. A role can be deened as a set of actions and responsibilities associated with a particular working activity. Then, instead of specifying all the accesses each individual user is allowed, access authorizations
منابع مشابه
A Flexible Model Supporting the Speci cation and Enforcement ofRole - based Authorizations in Work ow Management
In recent years, workkow management systems (WFMSs) have gained popularity both in research as well as in commercial sectors. WFMSs are used to coordinate and streamline business processes of an organization. Often, very large WFMSs are used in organizations with users in the range of several thousands and number of process instances in the range of tens of thousands. To simplify the complexity...
متن کاملImplementing Advanced RBAC Administration Functionality with USE1
Role-based access control (RBAC) is a powerful means for laying out and developing higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization constraints that express such organizational policies. While RBAC has generated a great interest in the security community, organizations stil...
متن کاملImplementing Advanced RBAC Administration Functionality with USE
Role-based access control (RBAC) is a powerful means for laying out and developing higher-level organizational policies such as separation of duty, and for simplifying the security management process. One of the important aspects of RBAC is authorization constraints that express such organizational policies. While RBAC has generated a great interest in the security community, organizations stil...
متن کاملCRBAC: Imposing multi-grained constraints on the RBAC model in the multi-application environment
(ABAC) mechanisms are gaining in popularity while the role-based access control (RBAC) mechanism is widely accepted as a general mechanism for authorization management. This paper proposes a new access control model, CRBAC, which aims to combine the advantages of RBAC and ABAC, and integrates all kinds of constraints into the RBAC model. Unlike other work in this area, which only incorporates o...
متن کاملSpecification and Classification of Role-based Authorization Policies
Constraints are an important aspect of role-based access control (RBAC). Although the importance of constraints in RBAC has been recognized for a long time, they have not received much attention. In this paper we classify RBAC constraints into two major classes called prohibition constraints and obligation constraints. To specify these constraints, we utilize a formal language, named RCL2000. I...
متن کامل