Automatic Migration to Role-Based Access Control

نویسندگان

  • Ian Molloy
  • Ninghui Li
  • Elisa Bertino
  • Eugene Spafford
  • Christopher Clifton
  • Aditya Mathur
  • William J. Gorman
  • Ian M. Molloy
چکیده

Molloy, Ian M. Ph.D., Purdue University, August 2010. Automatic Migration to Role Based Access Control. Major Professor: Ninghui Li. The success of role-based access control both within the research community and industry is undeniable. One of the main reasons for RBAC’s adoption is its ability to reduce administration costs, help eliminate errors, and improve the security of a system. Before these advantages can be observed, an organization must first migrate their access control data over to RBAC. This is a process known as role engineering, and is potentially expensive. We view the problem of role engineering as an optimization of the existing ac­ cess control information (permission assignments, attributes, usage logs, etc.) that maximizes the return on investment in deploying RBAC given a model of a human administrator. We focus on three main objectives: the RBAC state must be compact, and minimize the costs to administer access to users; the RBAC state must contain semantically meaningful roles that correspond to real-world concepts and job duties; and the RBAC state must be correct and secure. We develop a two-phase process for role mining: first clean the data, and then find candidate roles. Techniques based on rank-reduced matrix decomposition and a model of security are used to clean the data to eliminate errors, predict unknown values, and identify assignments that are applicable to RBAC. Second, we develop a measure of administrative costs based on the structural complexity of the RBAC system. The complexity is parameterized and makes few assumptions regarding administrative e⇥ort. Two algorithms founded in the theory of formal concept analysis are developed to minimize the RBAC state complexity while maintaining semantically meaningful roles.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

Role-Based Access Control for CORBA Distributed Object Systems

This paper shows how role-based access control (RBAC) models can be implemented in distributed object-based systems that follow OMG/CORBA standards. We introduce a novel approach that provides for automatic role activation by the security components of the middleware, which brings role-based access control to security-unaware applications.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012