Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy

被引:24
|
作者
Nazerian, Fatemeh [1 ]
Motameni, Homayun [1 ]
Nematzadeh, Hossein [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sari Branch, Sari, Iran
关键词
Role-based access control; Break the glass; Administrative model; Separation of duty; Formal specification; Alloy;
D O I
10.1016/j.jisa.2019.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In role-based access control (RBAC), users gain access to predetermined roles and permissions. Thus, desired results are not achieved in emergency situations through policy in RBAC. In emergency situations, users should sometimes gain access to resources not authorized in normal situations. To increase the flexibility of access control, Break the Glass (BTG) policy was proposed. It allows users to break or override access controls, while every operation is documented to create maximum responsibility for users. Users with BTG access have maximum freedom to override the access controls and constraints of the model. In this paper, the flexibility of RBAC is enhanced by proposing an Emergency RBAC (E-RBAC), which uses BTG policy for managing the system in emergency situation. However, separation of duty (SOD) constraint is included to control and limit user access in this situation. Then, an administrative model is proposed to manage large E-RBAC systems. An administrative model reduces excessive burden for an administrator in large E-RBAC systems. At the next stage, E-RBAC is illustrated with medical and drug-dispensation scenarios and is then implemented through Alloy (the first logic language) so as to analyze the validity of model specifications. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 50 条
  • [1] A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment
    Abu Bakar, Asmidar
    Ismail, Roslan
    Jais, Jamilin
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 533 - +
  • [2] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [3] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [4] uT-RBAC: Ubiquitous role-based access control model
    Chae, SH
    Kim, W
    Kim, DK
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (01): : 238 - 239
  • [5] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami G.
    Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
  • [6] UC-RBAC: A usage constrained role-based access control model
    Xu, Z
    Feng, DG
    Li, L
    Chen, H
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 337 - 347
  • [7] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [8] Management advantages of object classification in role-based access control (RBAC)
    Jafari, Mohammad
    Fathian, Mohammad
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 95 - 110
  • [9] I-RBAC: Isolation Enabled Role-Based Access Control
    Gunti, Nagajyothi
    Sun, Weiqing
    Niamat, Mohammed
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 79 - 86
  • [10] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241