Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy

被引:24
|
作者
Nazerian, Fatemeh [1 ]
Motameni, Homayun [1 ]
Nematzadeh, Hossein [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sari Branch, Sari, Iran
关键词
Role-based access control; Break the glass; Administrative model; Separation of duty; Formal specification; Alloy;
D O I
10.1016/j.jisa.2019.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In role-based access control (RBAC), users gain access to predetermined roles and permissions. Thus, desired results are not achieved in emergency situations through policy in RBAC. In emergency situations, users should sometimes gain access to resources not authorized in normal situations. To increase the flexibility of access control, Break the Glass (BTG) policy was proposed. It allows users to break or override access controls, while every operation is documented to create maximum responsibility for users. Users with BTG access have maximum freedom to override the access controls and constraints of the model. In this paper, the flexibility of RBAC is enhanced by proposing an Emergency RBAC (E-RBAC), which uses BTG policy for managing the system in emergency situation. However, separation of duty (SOD) constraint is included to control and limit user access in this situation. Then, an administrative model is proposed to manage large E-RBAC systems. An administrative model reduces excessive burden for an administrator in large E-RBAC systems. At the next stage, E-RBAC is illustrated with medical and drug-dispensation scenarios and is then implemented through Alloy (the first logic language) so as to analyze the validity of model specifications. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 50 条
  • [31] A generalized temporal role-based access control model
    Joshi, JBD
    Bertino, E
    Latif, U
    Ghafoor, A
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) : 4 - 23
  • [32] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [33] An improved Role-based workflow Access Control Model
    Zhao, Hui
    Fang, Zhiyi
    Xu, Peng
    Zhao, Lianyu
    Liu, Jin
    Wang, Tianyang
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, 2008, : 551 - 556
  • [34] An application using role-based access control model
    Wang, G
    Cong, B
    Chen, N
    Lan, M
    Yan, HT
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS I-V, 2000, : 369 - 375
  • [35] A role-based access control model for XML repositories
    He, H
    Wong, RK
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING, VOL I, 2000, : 138 - 145
  • [36] Role-based Access Control Model for Multicast in MANET
    Mu Haibing
    Zhang Changlun
    Zeng Ping
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 816 - 819
  • [37] Role-Based Access Control Models in E-Government
    Yu, Zheng
    FUZZY SYSTEMS, KNOWLEDGE DISCOVERY AND NATURAL COMPUTATION SYMPOSIUM (FSKDNC 2013), 2013, : 499 - 506
  • [38] Role-based access control and the access control matrix
    Saunders, G
    Hitchens, M
    Varadharajan, V
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 145 - 157
  • [39] Role-Based Access Control (RBAC) in Java']Java via Proxy Objects using Annotations
    Zarnett, Jeff
    Tripunitara, Mahesh
    Lam, Patrick
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 79 - 88
  • [40] On the formalization and analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    JOURNAL OF COMPUTER SECURITY, 2011, 19 (03) : 399 - 452