lambda-RBAC: Programming with Role-Based Access Control
نویسندگان
چکیده
b Bell Labs e-mail address: aje rey bell-labs. om Abstra t. We study me hanisms that permit program omponents to express role onstraints on lients, fo using on programmati se urity me hanisms, whi h permit a ess ontrols to be expressed, in situ, as part of the ode realizing basi fun tionality. In this setting, two questions immediately arise. (1) The user of a omponent fa es the issue of safety: is a parti ular role su ient to use the omponent? (2) The omponent designer fa es the dual issue of prote tion: is a parti ular role demanded in all exe ution paths of the omponent? We provide a formal al ulus and stati analysis to answer both questions. 1. Introdu tion This paper addresses programmati se urity me hanisms as realized in systems su h as Java Authenti ation and Authorization Servi e (jaas) and .net. These systems enable two forms of a ess ontrol me hanisms1. First, they permit de larative a ess ontrol to des ribe se urity spe i ations that are orthogonal and separate from des riptions of fun tionality, e.g., in an interfa e I, a de larative a ess ontrol me hanism ould require the aller to possess a minimum set of rights. While on eptually elegant, su h spe i ations do not dire tly permit the enfor ement of a ess ontrol that is sensitive to the ontrol and data ow of the ode implementing the fun tionality onsider for example history sensitive se urity poli ies that require runtime monitoring of relevant events. Consequently, jaas and .net also in lude programmati me hanisms that permit a ess ontrol ode to be intertwined with fun tionality ode, e.g., in the ode of a omponent implementing interfa e I. On the one hand, su h programmati me hanisms permit the dire t expression of a ess ontrol poli ies. However, the programmati approa h leads to the ommingling of the on eptually separate on erns of se urity and fun tionality. 1998 ACM Subje t Classi ation: D.3, K.6.5.
منابع مشابه
Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملROAC: A Role-Oriented Access Control Model
Role-Based Access Control (RBAC) has become the de facto standard for realizing authorization requirements in a wide range of organizations. Existing RBAC models suffer from two main shortcomings; lack of expressiveness of roles/permissions and ambiguities of their hierarchies. Roles/permissions expressiveness is limited since roles do not have the ability to express behaviour and state, while ...
متن کاملA Formal Model for Flat Role-Based Access Control
Role-Based Access Control (RBAC) is very useful for providing a high level description of access control. It enables a better understanding of the security problems in an institution because it bridges the gap between their technical aspects and their managerial descriptions. Several models have been devised to describe RBAC. However, the definitions of some of the concepts of RBAC, such as sub...
متن کاملAn Evaluation of RBAC Policy Languages for Web Applications
The rapid growth of the Internet and a range of web applications bring the urgency of security issues, especially for access control. Role-based Access Control (RBAC) is recognized as a superior alternative and less error-prone to traditional discretionary and mandatory access controls. In this paper, we examine the representation of RBAC policies in web applications under distributed environme...
متن کاملSpecification and Classification of Role-based Authorization Policies
Constraints are an important aspect of role-based access control (RBAC). Although the importance of constraints in RBAC has been recognized for a long time, they have not received much attention. In this paper we classify RBAC constraints into two major classes called prohibition constraints and obligation constraints. To specify these constraints, we utilize a formal language, named RCL2000. I...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Logical Methods in Computer Science
دوره 4 شماره
صفحات -
تاریخ انتشار 2006