Policy analysis for administrative role based access control without separate administration

被引:3
|
作者
Yang, Ping [1 ]
Gofman, Mikhail I. [2 ]
Stoller, Scott D. [3 ]
Yang, Zijiang [4 ]
机构
[1] SUNY Binghamton, Dept Comp Sci, Binghamton, NY 13902 USA
[2] Calif State Univ Fullerton, Dept Comp Sci, Fullerton, CA 92634 USA
[3] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
[4] Western Michigan Univ, Dept Comp Sci, Kalamazoo, MI 49008 USA
基金
美国国家科学基金会;
关键词
Administrative role-based access control; policy analysis;
D O I
10.3233/JCS-140511
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role based access control (RBAC) is a widely used approach to access control with well-known advantages in managing authorization policies. This paper considers user-role reachability analysis of administrative role based access control (ARBAC), which defines administrative roles and specifies how members of each administrative role can change the RBAC policy. Most existing works on user-role reachability analysis assume the separate administration restriction in ARBAC policies. While this restriction greatly simplifies the user-role reachability analysis, it also limits the expressiveness and applicability of ARBAC. In this paper, we consider analysis of ARBAC without the separate administration restriction and present new techniques to reduce the number of ARBAC rules and users considered during analysis. We also present parallel algorithms that speed up the analysis on multi-core systems. The experimental results show that our techniques significantly reduce the analysis time, making it practical to analyze ARBAC without separate administration.
引用
收藏
页码:1 / 29
页数:29
相关论文
共 50 条
  • [41] A policy based framework for access control
    Nabhen, R
    Jamhour, E
    Maziero, C
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 47 - 59
  • [42] Access Control Policy Generation Method Based on Access Control Logs
    Liu Aodi
    Du Xuehui
    Wang Na
    Shan Dibin
    Zhang Liu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 324 - 331
  • [43] Configuring role-based access control to enforce Chinese Wall policy
    Zhao, QS
    Sun, YF
    COMPUTER SCIENCE AND TECHNOLOGY IN NEW CENTURY, 2001, : 206 - 209
  • [44] Security policy management for systems employing role based access control model
    Huang, Chao
    Sun, Jianling
    Wang, Xinyu
    Si, Yuanjie
    Information Technology Journal, 2009, 8 (05) : 726 - 734
  • [45] Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
    He, Qingfeng
    Anton, Annie I.
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (06) : 993 - 1009
  • [46] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52
  • [47] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [48] Administration of Machine Learning Based Access Control
    Nobi, Mohammad Nur
    Krishnan, Ram
    Huang, Yufei
    Sandhu, Ravi
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 189 - 210
  • [49] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [50] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157