RBAC-PAT: A Policy Analysis Tool for Role Based Access Control

被引:0
|
作者
Gofman, Mikhail I. [1 ]
Luo, Ruiqi [1 ]
Solomon, Ayla C. [2 ]
Zhang, Yingbin [1 ]
Yang, Ping [1 ]
Stoller, Scott D. [3 ]
机构
[1] SUNY Binghamton, Dept Comp Sci, Binghamton, NY 13902 USA
[2] Wellesley Coll, Dept Comp Sci, Wellesley, MA 02181 USA
[3] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (ARBAC) specifies how an RBAC policy may be changed by each administrator. Because sequences of changes by different administrators may interact in unintended ways, it is often difficult to fully understand the effect of an ARBAC policy by simple inspection. This paper presents RBAC-PAT, a tool for analyzing RBAC and ARBAC policies, which supports analysis of various properties including reachability, availability, containment, weakest precondition, dead roles, and information flows.
引用
收藏
页码:46 / +
页数:2
相关论文
共 50 条
  • [31] An application of directory service markup language (DSML) for role-based access control (RBAC)
    Shin, DW
    Ahn, GJ
    Park, JS
    26TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 934 - 939
  • [32] Efficient and Flexible Role-Based Access Control (EF-RBAC) Mechanism for Cloud
    Harnal, Shilpi
    Chauhan, R. K.
    EAI ENDORSED TRANSACTIONS ON SCALABLE INFORMATION SYSTEMS, 2020, 7 (26) : 1 - 10
  • [33] Fine-grained Access Control Model Based on RBAC
    Gao, Lei
    Pan, Shulin
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 1667 - +
  • [34] A Hierarchical Access Control Model of Software Repository Based on RBAC
    Cen Pengrui
    Wu LingDa
    Yang Chao
    Yu Ronghuan
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 761 - 765
  • [35] Modeling of RBAC-based access control of virtual enterprise
    Chen, Dejun
    Zhou, Zude
    Ma, Yingzhe
    Pham, D. T.
    KYBERNETES, 2008, 37 (9-10) : 1242 - 1249
  • [36] RBACvisual: A Visualization Tool for Teaching Access Control using Role-based Access Control
    Wang, Man
    Mayo, Jean
    Shene, Ching-Kuang
    Lake, Thomas
    Carr, Steve
    Wang, Chaoli
    ITICSE'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2015, : 141 - 146
  • [37] Improvement of a multi-role-based access control policy
    Shen, VRL
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2000, E83A (07) : 1483 - 1485
  • [38] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [39] A Review on Extended Role Based Access Control (E-RBAC) Model in Pervasive Computing Environment
    Abu Bakar, Asmidar
    Ismail, Roslan
    Jais, Jamilin
    NDT: 2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKED DIGITAL TECHNOLOGIES, 2009, : 533 - +
  • [40] HT-RBAC: A Design of Role-based Access Control Model for Microservice Security Manager
    Pasomsup, Chittipat
    Limpiyakorn, Yachai
    2021 INTERNATIONAL CONFERENCE ON BIG DATA ENGINEERING AND EDUCATION (BDEE 2021), 2021, : 177 - 181