A History-based Constraint for Separation-of-Duty Policy in Role Based Access Control Model

被引:0
|
作者
Wang, Duoqiang [1 ]
Liu, Wengfang [1 ]
Lu, Jianfeng [1 ]
Ma, Xiaopu [1 ]
机构
[1] Huazhong Univ Sci & Technol, Coll Comp Sci & Technol, Wuhan 430074, Peoples R China
关键词
role based access control; separation-of-duty; history-based constraint; statically mutually exclusive roles;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Separation-of-duty (SoD) is widely considered to be a fundamental principle in computer security. Role-based access control (RBAC) is today's dominant access control model, and supporting SoD policy is widely regarded as one of RBAC's main strengths. In this paper, we show that checking whether a RBAC state satisfies a given static SoD (SSoD) policy is a coNP-complete problem, and using statically mutually exclusive roles (SHIER) to enforce SSoD is usually computationally expensive, while enforcing SSoD policies by a history-based constraint is practicable. Our approach is focused on high-level SSoD policy, and the key idea is to record each permission access request, this history is maintained and processed by two different mechanisms based on two cases, one case is n=2 or m=n, the other case is 2<n<m, The history-based constraint consists of the two cases addresses the goal of the high-level SSoD policy in RBAC model.
引用
收藏
页码:195 / 199
页数:5
相关论文
共 50 条
  • [32] A simple model of separation of duty for access control models
    Ultra, J. D.
    Pancho-Festin, S.
    COMPUTERS & SECURITY, 2017, 68 : 69 - 80
  • [33] Concurrent History-based Usage Control Policies
    Martinelli, Fabio
    Matteucci, Ilaria
    Mori, Paolo
    Saracino, Andrea
    MODELSWARD: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, 2017, : 657 - 666
  • [34] Duty-Based Workflow Dynamic Access Control Model
    Yi, Guohong
    Wu, Bingqian
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, ICIC 2023, PT I, 2023, 14086 : 511 - 521
  • [35] The XML-Based Context-Constraint Access Control Policy
    Zhang, Zhikun
    Xiao, Jianguo
    Geng, Youping
    Li, Hanyi
    2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 1009 - +
  • [36] Security policy management for systems employing role based access control model
    Huang, Chao
    Sun, Jianling
    Wang, Xinyu
    Si, Yuanjie
    Information Technology Journal, 2009, 8 (05) : 726 - 734
  • [37] Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control
    Jha, Sadhana
    Sural, Shamik
    Atluri, Vijayalakshmi
    Vaidya, Jaideep
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (04) : 897 - 911
  • [38] An Efficient Verification Approach to Separation of Duty in Attribute-Based Access Control
    Yang, Benyuan
    Hu, Hesuan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (09) : 4428 - 4442
  • [39] Verification of dynamic Separation of Duty policy for role-based business processes
    Thipse, Aashay
    Hewett, Rattikorn
    2008 IEEE REGION 5 CONFERENCE, 2008, : 206 - 211
  • [40] Combination of Duty and Historical Constraints in Role-Based Access Control
    Hosseini, Ali
    Azgomi, Mohammad Abdollahi
    2009 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2009, : 156 - +