An Evaluation of RBAC Policy Languages for Web Applications

نویسندگان

  • Jing Zhang
  • Xiaojie Shen
  • Almut Herzog
چکیده

The rapid growth of the Internet and a range of web applications bring the urgency of security issues, especially for access control. Role-based Access Control (RBAC) is recognized as a superior alternative and less error-prone to traditional discretionary and mandatory access controls. In this paper, we examine the representation of RBAC policies in web applications under distributed environments. Firstly, several important requirements and features for RBAC policy languages, especially with the consideration of web applications are identified. They are expressive, inter-operable, applicable to heterogeneity, flexible, manageable, and efficient. Then we categorized the existing RBAC policy languages into four categories: XML-based, UMLbased, Object-oriented programming languages, and Constraint logic languages. Each category is carefully examined and evaluated, and a comparison with respect to the requirements is given. We conclude with recommendations for XML as a basis for a RBAC policy language.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Using OWL to Model Role Based Access Control

Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting the policy needs of real world application domains while others are exploring new policy languages. This paper is motivated by the desire to develop a synergy between these themes facilitated by OWL. Our vision for the future is a world where advanced access control ...

متن کامل

Static Enforcement of Role-Based Access Control on Method Invocation

We propose a new static approach to RBAC policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system’s architecture, helping to ensure that policies are correctly defined and enforced. We apply this new approach to policies restricting calls to methods in Java applications. How...

متن کامل

Access Control in Dynamic XML-Based Web-Services with X-RBAC

Policy specification for securing Web services is fast emerging as a key research area due to rapid proliferation of Web services in modern day enterprise applications. Whilst the use of XML technology to support these Web services has resulted in their tremendous growth, it has also introduced a new set of security challenges specific to these Web services. Though there has been recent researc...

متن کامل

A Review Paper Role Based Access Control

The essence of Role-Based Access Control (RBAC) is that system permissions are assigned to defined “roles” rather than to individual users. Users acquire these permissions by virtue of being authorised to act in a categorised manner known as a “role”. The driving motivation for RBAC is to simplify security policy administration while facilitating the definition of flexible, customised policies....

متن کامل

An RBAC Model-Based Approach to Specify the Access Policies of Web-Based Emergency Information Systems

One of the main design challenges of any Web-based Emergency Management Information System (WEMIS) is the diversity of users and responsibilities to be considered. Modelling the access capabilities of different communities of users is a most relevant concern for which the RBAC (Role-Based Access Control) paradigm provides flexible and powerful constructs. In this paper we describe how we used a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001