Role-based access control: a multi-dimensional view

نویسندگان

  • Ravi S. Sandhu
  • Edward J. Coyne
  • Hal L. Feinstein
  • Charles E. Youman
چکیده

Recently there has been considerable interest in role-based access control (RBAC) as an alternative, and supplement, to the traditional discretionary and mandatory access controls (DAC and MAC) embodied in the Orange Book. The roots of RBAC can be traced back to the earliest access control systems. Roles have been used in a number of systems for segregating various aspects of security and system administration. Recent interest in RBAC has been motivated by the use of roles at the application level to control access to application data. This is an important innovation which o ers the opportunity to realize bene ts in securing an organization's information assets, similar to the bene ts of employing databases instead of les as the data repository. A number of proposals for RBAC have been published in the literature, but there is no consensus on precisely what is meant by RBAC. This paper lays the groundwork for developing this consensus. In our view RBAC is a concept which has several dimensions, all of which may not be present in a given system or product. We envisage each dimension as being linearly ordered with respect to the sophistication of features provided. This leads us to the idea of a multi-dimension model for RBAC. Achieving agreement on what these dimensions are, and how the features in each dimension should be ordered, will take debate and time. Our contribution here is to lay out a vision on how to approach a common understandThis paper is funded in part by a contract (50-DKNA-400122) from the National Oceanic and Atmospheric Administration. The views expressed herein are those of the authors and do not necessarily re ect the views of NOAA or any of its subagencies. The authors are grateful to David Ferraiolo and Janet Cugini of the National Institute of Standards and Technology for their support and encouragement inmaking this work possible. Ravi S. Sandhu is also a liated with the Department of Information and Software Systems Engineering at George Mason University, Fairfax, VA 22030. ing of RBAC, and take a rst cut at identifying the dimensions of RBAC. A major bene t of such a multidimensional RBAC would be to allow comparison of di erent products and assess their appropriateness for various system requirements.

منابع مشابه

Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network

Role-Based Access Control: A Multi-Dimensional View p. 54 Panel: Reexamining Assurance p. 64 Plenary Panel: Secure System Composition p. 66 Secure System Composition: Five Practical Initiatives p. 67 Architectural Impact on Performance of a Multilevel Database System p. 76 Benchmarking Multilevel Secure Database Systems Using the MITRE Benchmark p. 86 Organizing MLS Databases from a Data Modeli...

متن کامل

Design and Implementation of Collaborative Ciphertext-Policy Attribute-Role based

In a real-world collaborative data sharing scenario in cloud computing, there are multiple users who can access the resource shared by multiple data owners anytime and anywhere. The evolution of user status, roles, and privilege in the federated data sharing environment become even more and more complex to handle. Efficiently managing multiple access control policies and providing appropriate a...

متن کامل

A Scalable Parametric-RBAC Architecture for the Propagation of a Multi-modality, Multi-resource Informatics System

We present a scalable architecture called X-MIMI for the propagation of MIMI (Multi-modality, Multi-resource, Informatics Infrastructure System) to the biomedical research community. MIMI is a web-based system for managing the latest instruments and resources used by clinical and translational investigators. To deploy MIMI broadly, X-MIMI utilizes a parametric Role-Based Access Control model to...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

متن کامل
عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994