Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy

被引:24
|
作者
Nazerian, Fatemeh [1 ]
Motameni, Homayun [1 ]
Nematzadeh, Hossein [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sari Branch, Sari, Iran
关键词
Role-based access control; Break the glass; Administrative model; Separation of duty; Formal specification; Alloy;
D O I
10.1016/j.jisa.2019.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In role-based access control (RBAC), users gain access to predetermined roles and permissions. Thus, desired results are not achieved in emergency situations through policy in RBAC. In emergency situations, users should sometimes gain access to resources not authorized in normal situations. To increase the flexibility of access control, Break the Glass (BTG) policy was proposed. It allows users to break or override access controls, while every operation is documented to create maximum responsibility for users. Users with BTG access have maximum freedom to override the access controls and constraints of the model. In this paper, the flexibility of RBAC is enhanced by proposing an Emergency RBAC (E-RBAC), which uses BTG policy for managing the system in emergency situation. However, separation of duty (SOD) constraint is included to control and limit user access in this situation. Then, an administrative model is proposed to manage large E-RBAC systems. An administrative model reduces excessive burden for an administrator in large E-RBAC systems. At the next stage, E-RBAC is illustrated with medical and drug-dispensation scenarios and is then implemented through Alloy (the first logic language) so as to analyze the validity of model specifications. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 50 条
  • [21] Analysis of enhanced separation of duty in role-based access control model
    Zhang, ZK
    Geng, YP
    Li, TY
    Xiao, JG
    Proceedings of the 11th Joint International Computer Conference, 2005, : 69 - 72
  • [22] Formal Z specifications of several flat Role-Based Access Control models
    Abdallah, Ali E.
    Khayat, Etienne J.
    30TH ANNUAL IEEE/NASA SOFTWARE ENGINEERING WORKSHOP, PROCEEDINGS, 2006, : 282 - +
  • [23] Role-based access control
    Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [24] A role-based access control model for information mediation
    Yang, L
    Ege, RK
    Ezenwoye, O
    Kharma, Q
    PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI-2004), 2004, : 277 - 282
  • [25] Research and implementation of role-based RBAC administration model
    Qiu, J
    Ma, CH
    Yin, JW
    Dong, JX
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 746 - 750
  • [26] Role-based access control model for CSCW systems
    Li, Chengkai
    Zhan, Yongzhao
    Mao, Bing
    Xie, Li
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (07): : 931 - 937
  • [27] Attributes Enhanced Role-Based Access Control Model
    Rajpoot, Qasim Mahmood
    Jensen, Christian Damsgaard
    Krishnan, Ram
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 3 - 17
  • [28] The Research for Spatial Role-Based Access Control Model
    Zou, Zhiwen
    Chen, Changqian
    Ju, Shiguang
    Chen, Jiming
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 296 - 308
  • [29] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [30] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246