Integrating Delegation with the Formal Core RBAC Model

被引:1
|
作者
Abdallah, Ali E. [1 ]
Takabi, Hassan [1 ]
机构
[1] London S Bank Univ, ESecur Res Ctr, London SE1 0AA, England
关键词
D O I
10.1109/IAS.2008.66
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) models are a powerful tool for describing and managing authorization, particularly, in large organizations. The benefits of using formal methods to describe RBAC models in a clear, consistent and rigorous manner have been recognized. Notable exemplars, that have been formulated in the formal specification notation Z, include NIST's reference RBAC model and the minimalist Core RBAC model. These models, however, do not support delegation, an important authorization feature which is often deployed in real access control systems. In RBAC, delegation empowers a user in a certain role to authorize another user to perform the tasks permissible to that role. This paper aims at integrating a version of role delegation, known as grant independent delegation, with the Core RBAC model. The paper introduces a state based model in which grant independent delegation and revocation operations are formally specified in Z. Integration with the Core RBAC model is achieved by simply combining the two models using the standard Z schema conjunction operator.
引用
收藏
页码:33 / 36
页数:4
相关论文
共 50 条
  • [31] Integrating RBAC, MIC, and MLS in Verified Hierarchical Security Model for Operating System
    P. N. Devyanin
    A. V. Khoroshilov
    V. V. Kuliamin
    A. K. Petrenko
    I. V. Shchepetkov
    Programming and Computer Software, 2020, 46 : 443 - 453
  • [32] Integrating attribute and status constraint into the RBAC model for access control in ubiquitous systems
    Zou, Deqing
    Park, Jong Hyuk
    Kim, Tai-hoon
    Chen, Xueguang
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 71 - +
  • [33] A Formal Approach for Risk Assessment in RBAC Systems
    Ma, Ji
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (17) : 2432 - 2451
  • [34] A WLAN security management framework based on formal spatio-temporal RBAC model
    Bera, P.
    Ghosh, S. K.
    Dasgupta, Pallab
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (09) : 981 - 993
  • [35] A formal comparison of the Bell & LaPadula and RBAC models
    Habib, Lionel
    Jaume, Mathieu
    Morisset, Charles
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 3 - +
  • [36] Integrating Formal Methods with Model-driven Engineering
    Gargantini, Angelo
    Riccobene, Elvinia
    Scandurra, Patrizia
    2009 FOURTH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ADVANCES (ICSEA 2009), 2009, : 86 - +
  • [37] A Formal Model of Emotions: Integrating Qualitative and Quantitative Aspects
    Steunebrink, Bas R.
    Dastani, Mehdi
    Meyer, John-Jules Ch.
    ECAI 2008, PROCEEDINGS, 2008, 178 : 256 - +
  • [38] Ts-RBAC: A RBAC model with transformation
    Liu, Gang
    Zhang, Runnan
    Song, Huimin
    Wang, Can
    Liu, Jinhui
    Liu, Aijun
    COMPUTERS & SECURITY, 2016, 60 : 52 - 61
  • [39] An Evaluation Model of Integrating Emerging Technology into Formal Curriculum
    Kuo, Lung-Hsing
    Wei, Huei-Mei
    Chen, Li-Min
    Wang, Ming-Chen
    Ho, Miao-Kuei
    Yang, Hung-Jen
    INTERNATIONAL JOURNAL OF EDUCATION AND INFORMATION TECHNOLOGIES, 2012, 6 (01): : 250 - 259
  • [40] Integrating Delegation into the Policy Theory Literature
    Lavertu, Stephane
    Weimer, David L.
    POLICY STUDIES JOURNAL, 2009, 37 (01) : 93 - 102