RBAC-PAT: A Policy Analysis Tool for Role Based Access Control

被引:0
|
作者
Gofman, Mikhail I. [1 ]
Luo, Ruiqi [1 ]
Solomon, Ayla C. [2 ]
Zhang, Yingbin [1 ]
Yang, Ping [1 ]
Stoller, Scott D. [3 ]
机构
[1] SUNY Binghamton, Dept Comp Sci, Binghamton, NY 13902 USA
[2] Wellesley Coll, Dept Comp Sci, Wellesley, MA 02181 USA
[3] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (ARBAC) specifies how an RBAC policy may be changed by each administrator. Because sequences of changes by different administrators may interact in unintended ways, it is often difficult to fully understand the effect of an ARBAC policy by simple inspection. This paper presents RBAC-PAT, a tool for analyzing RBAC and ARBAC policies, which supports analysis of various properties including reachability, availability, containment, weakest precondition, dead roles, and information flows.
引用
收藏
页码:46 / +
页数:2
相关论文
共 50 条
  • [1] λ-RBAC: PROGRAMMING WITH ROLE-BASED ACCESS CONTROL
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    LOGICAL METHODS IN COMPUTER SCIENCE, 2008, 4 (01)
  • [2] λ-RBAC:: Programming with role-based access control
    Jagadeesan, Radha
    Jeffrey, Alan
    Pitcher, Corin
    Riely, James
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, 2006, 4052 : 456 - 467
  • [3] DS RBAC - Dynamic Sessions in Role Based Access Control
    Muehlbacher, Joerg R.
    Praher, Christian
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (03) : 538 - 554
  • [4] Role-based Access Control (RBAC) Authorization in Kubernetes
    Rostami G.
    Journal of ICT Standardization, 2023, 11 (03): : 237 - 260
  • [5] A Novel Role-Based-Access-Control(RBAC) Framework and Application
    Zhou, Yanjie
    Wen, Min
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY, 2015, 30 : 207 - 210
  • [6] Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments
    Tripunitara, Mahesh V.
    Carbunar, Bogdan
    SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 155 - 164
  • [7] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [8] Efficient Policy Analysis for Administrative Role Based Access Control
    Stoller, Scott D.
    Yang, Ping
    Ramakrishnan, C. R.
    Gofman, Mikhail I.
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 445 - +
  • [9] Owner-Based Role-Based Access Control OB-RBAC
    Saffarian, Mohsen
    Sadighi, Babak
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 236 - 241
  • [10] Emergency role-based access control (E-RBAC) and analysis of model specifications with alloy
    Nazerian, Fatemeh
    Motameni, Homayun
    Nematzadeh, Hossein
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 131 - 142