Analysis of ANSI RBAC Support in COM+

نویسندگان

  • Wesam Darwish
  • Konstantin Beznosov
چکیده

In most cases authors are permitted to post their version of the article (e.g. in Word or Tex form) to their personal website or institutional repository. Authors requiring further information regarding Elsevier's archiving and manuscript policies are encouraged to visit: a b s t r a c t a r t i c l e i n f o We analyze access control mechanisms of the COM+ architecture and define a configuration of the COM+ protection system in more precise and less ambiguous language than the COM+ documentation. Using this configuration, we suggest an algorithm that formally specifies the semantics of authorization decisions in COM+. We analyze the level of support for the American National Standard Institute's (ANSI) specification of role-based access control (RBAC) components and functional specification in COM+. Our results indicate that COM+ falls short of supporting even Core RBAC. The main limitations exist due to the tight integration of the COM+ architecture with the underlying operating system, which prevents support for session management and role activation, as specified in ANSI RBAC. In role-based access control (RBAC) systems, permissions are associated with roles and users are assigned to appropriate roles. A role can represent competency, authority, responsibility or specific duty assignments. A major purpose of RBAC is to facilitate access control administration and review. It arguably addresses the needs of the commercial enterprises better than lattice-based MAC [1] and owner-based DAC [2]. Many papers describe ways to model or implement RBAC using the technologies employed by the commercial users. Evidence of RBAC becoming a dominant access control paradigm is the approval of the American National Standard for Information Technology Role-Based Access Control (ANSI RBAC) [13] in 2004. The ANSI RBAC standard consists of two main parts: the RBAC Reference Model, and the RBAC System and Administrative Functional Specification. The two parts specify four profiles: Core RBAC with the minimum set of features included in all RBAC systems, Hierarchical RBAC that defines role hierarchies, as well as Static Separation of Duty Relations and Dynamic Separation of Duty Relations that define static and dynamic constraint relations, accordingly. At the same time, commercial middleware technologies—such as Common Object Request Broker Architecture (CORBA) [14], COM+ [15], Enterprise Java Beans (EJB) [16]—became mature, with distributed enterprise applications routinely developed with the use of middleware. Each middleware technology, however, comes with its own security subsystem [17–19], sometimes dependent and specific to the underlying operating …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of ANSI RBAC Support in Commercial Middleware

This thesis analyzes the access control architectures of three middleware technologies: Common Object Request Broker Architecture (CORBA), Enterprise Java Beans (EJB), and Component Object Model (COM+). For all technologies under study, we formalize the protection state of their corresponding authorization architectures in a more precise and less ambiguous language than their respective specifi...

متن کامل

Analysis of ANSI RBAC Support in EJB

We analyze access control mechanisms of the Enterprise Java Beans (EJB) architecture and define a configuration of the EJB protection system in a more precise and less ambiguous language than the EJB 3.0 standard. Using this configuration, we suggest an algorithm that formally specifies the semantics of authorization decisions in EJB. We analyze the level of support for the American National St...

متن کامل

Support for ANSI RBAC in CORBA

We describe access control mechanisms of the Common Object Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language than the CORBA Security specification (CORBASec). Using the configuration definition, we suggest an algorithm that formally specifies the semantics of authorization decisions in CORBA. We analyze supp...

متن کامل

DS RBAC - Dynamic Sessions in Role Based Access Control

Besides the well established access control models, Discretionary Access Control (DAC) and Mandatory Access Control (MAC), the policy neutral Role Based Access Control (RBAC) is gaining increasing attention. An important step towards a wide acceptance of RBAC has been achieved by the standardization of RBAC through the American National Standards Institute (ANSI). While the mandatory concept of...

متن کامل

Extended RBAC with Role Attributes for pacis 2006\374

Though RBAC has been researched for many years as a current dominant access control technology, there are few researches to be done to address the further extension of the role which is the fundamental entity of RBAC. This paper tries to extend the role to a further level, the role attributes. Through the attributes, the function and operation on the role can be enhanced and extended. Through t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Standards & Interfaces

دوره 32  شماره 

صفحات  -

تاریخ انتشار 2010