Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy

被引:24
|
作者
Nazerian, Fatemeh [1 ]
Motameni, Homayun [1 ]
Nematzadeh, Hossein [1 ]
机构
[1] Islamic Azad Univ, Dept Comp Engn, Sari Branch, Sari, Iran
关键词
Role-based access control; Break the glass; Administrative model; Separation of duty; Formal specification; Alloy;
D O I
10.1016/j.jisa.2019.01.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In role-based access control (RBAC), users gain access to predetermined roles and permissions. Thus, desired results are not achieved in emergency situations through policy in RBAC. In emergency situations, users should sometimes gain access to resources not authorized in normal situations. To increase the flexibility of access control, Break the Glass (BTG) policy was proposed. It allows users to break or override access controls, while every operation is documented to create maximum responsibility for users. Users with BTG access have maximum freedom to override the access controls and constraints of the model. In this paper, the flexibility of RBAC is enhanced by proposing an Emergency RBAC (E-RBAC), which uses BTG policy for managing the system in emergency situation. However, separation of duty (SOD) constraint is included to control and limit user access in this situation. Then, an administrative model is proposed to manage large E-RBAC systems. An administrative model reduces excessive burden for an administrator in large E-RBAC systems. At the next stage, E-RBAC is illustrated with medical and drug-dispensation scenarios and is then implemented through Alloy (the first logic language) so as to analyze the validity of model specifications. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页码:131 / 142
页数:12
相关论文
共 50 条
  • [41] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [42] Delta Analysis of Role-Based Access Control Models
    Leitner, Maria
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 507 - 514
  • [43] Role-Based Access Control and the Access Control Matrix
    Saunders, G.
    Hitchens, M.
    Varadharajan, V.
    2001, Association for Computing Machinery (35):
  • [44] On the formal analysis of a spatio-temporal role-based access control model
    Toahchoodee, Manachai
    Ray, Indrakshi
    DATA AND APPLICATIONS SECURITY XXII, 2008, 5094 : 17 - 32
  • [45] Role hierarchy model for role-based access control and its application
    Zhong, Hua
    Feng, Yulin
    Jiang, Hongan
    2000, (11):
  • [46] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [47] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [48] Role-based access control hierarchy model in distributed system
    Hong, Fan
    Wu, Min
    2003, Huazhong University of Science and Technology (31):
  • [49] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [50] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136