Policy analysis for administrative role based access control without separate administration

被引:3
|
作者
Yang, Ping [1 ]
Gofman, Mikhail I. [2 ]
Stoller, Scott D. [3 ]
Yang, Zijiang [4 ]
机构
[1] SUNY Binghamton, Dept Comp Sci, Binghamton, NY 13902 USA
[2] Calif State Univ Fullerton, Dept Comp Sci, Fullerton, CA 92634 USA
[3] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
[4] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
基金
美国国家科学基金会;
关键词
Administrative role-based access control; policy analysis;
D O I
10.3233/JCS-140511
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role based access control (RBAC) is a widely used approach to access control with well-known advantages in managing authorization policies. This paper considers user-role reachability analysis of administrative role based access control (ARBAC), which defines administrative roles and specifies how members of each administrative role can change the RBAC policy. Most existing works on user-role reachability analysis assume the separate administration restriction in ARBAC policies. While this restriction greatly simplifies the user-role reachability analysis, it also limits the expressiveness and applicability of ARBAC. In this paper, we consider analysis of ARBAC without the separate administration restriction and present new techniques to reduce the number of ARBAC rules and users considered during analysis. We also present parallel algorithms that speed up the analysis on multi-core systems. The experimental results show that our techniques significantly reduce the analysis time, making it practical to analyze ARBAC without separate administration.
引用
收藏
页码:1 / 29
页数:29
相关论文
共 50 条
  • [31] Edge-RMP: Minimizing administrative assignments for role-based access control
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    Guo, Qi
    Lu, Haibing
    JOURNAL OF COMPUTER SECURITY, 2009, 17 (02) : 211 - 235
  • [32] Translating role-based access control policy within context
    Bacon, J
    Lloyd, M
    Moody, K
    POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 107 - 119
  • [33] Beyond Administration: A Modeling Scheme Supporting the Dynamic Analysis of Role-based Access Control Policies
    Schlegel, Marius
    Amthor, Peter
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 431 - 442
  • [34] Policy Based Role Centric Attribute Based Access Control Model Policy RC-ABAC
    Varadharajan, Vijayaraghavan
    Amid, Alon
    Rai, Sudhanshu
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 427 - 432
  • [35] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [36] Security analysis for temporal role based access control
    Uzun, Emre
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    Sural, Shamik
    Ferrara, Anna
    Parlato, Gennaro
    Madhusudan, P.
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (06) : 961 - 996
  • [37] Category-Based Administrative Access Control Policies
    Bertolissi, Clara
    Fernandez, Maribel
    Thuraisingham, Bhavani
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [38] An Administrative Model for Relationship-Based Access Control
    Stoller, Scott D.
    Data and Applications Security and Privacy XXIX, 2015, 9149 : 53 - 68
  • [39] Role Based Access Control in enterprise application - Security administration and user management
    Bindiganavale, Vinith
    Ouyang, Jinsong
    IRI 2006: PROCEEDINGS OF THE 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2006, : 111 - +
  • [40] An improved administration method on role-based access control in the enterprise environment
    Oh, S
    Park, S
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2001, 17 (06) : 921 - 944