skip to main content
10.1145/507711.507714acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

A lightweight approach to specification and analysis of role-based access control extensions

Published:03 June 2002Publication History

ABSTRACT

Role-based access control is a powerful and policy-neutral concept for enforcing access control. Many extensions have been proposed, the most significant of which are the decentralised administration of role-based systems and the enforcement of constraints. However, the simultaneous integration of these extensions can cause conflicts in a later system implementation. We demonstrate how we use the Alloy language for the specification of a conflict-free role-based system. This specification provides us at the same time with a suitable basis for further analysis by the Alloy constraint analyser.

References

  1. G. Ahn. RCL 2000. Phd dissertation, George Mason University, 2000.Google ScholarGoogle Scholar
  2. D. Clark and D. Wilson. A comparison of commercial and military security policies. In IEEE Symposium on Security and Privacy, pages 184--194, Oakland, California, 1987.Google ScholarGoogle ScholarCross RefCross Ref
  3. V. Gligor, S. Gavrila, and D. Ferraiolo. On the formal definition of separation-of-duty policies and their composition. In IEEE Symposium on Security and Privacy, pages 172--185, Oakland, CA, 1998.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. Jackson. Alloy: A leightweight object modelling notation. Technical Report 797, MIT Laboratory for Computer Science, 2000.Google ScholarGoogle Scholar
  5. D. Jackson, I. Schechter, and I. Shlyakhter. Alcoa: the Alloy constraint analyzer. In Proc. International Conference on Software Engineering, Limerick, Ireland, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. T. Jaeger and J. Tidswell. Practical safety in flexible access control models. ACM Transactions on Information and System Security (TISSEC), 4(2), 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In 2nd ACM workshop on Role-based access control, pages 23--30, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Moffett. Control principles and role hierarchies. In 3rd ACM Workshop on Role Based Access Control, pages 63--72, George Mason University, Fairfax, VA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Moffett and E. Lupu. The uses of role hierarchies in access control. In 4th ACM Workshop on Role-Based Access Control, pages 153--160, Fairfax, Virginia, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M. Nash and K. Poland. Some conundrums concerning separation of duty. In IEEE Symposium on Security and Privacy, pages 201--209, Oakland, CA, 1990.Google ScholarGoogle ScholarCross RefCross Ref
  11. R. Sandhu, V. Bhamidipati, and Q. Munawer.The ARBAC97 model for role-based administration of roles. ACM Transactions. Inf. Syst. Security, 2(1):105 -- 135, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Sandhu and F. Chen. Constraints for role-based access control. In 1st ACM Workshop on Role-based access control, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST model for role-based access control: Towards a unified standard. In 5th ACM Workshop on Role-based access control, Berlin, Germany, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Schaad. Conflict detection in a role-based delegation model. In 17th Annual Computer Security Applications Conference, New Orleans, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Schaad, J. Moffett, and J. Jacob. The access control system of a European bank - a case study. In 6th ACM Symposium on Access Control Models and Technologies (SACMAT), Chantilly, VA, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. Simon and M. Zurko. Separation of duty in role-based environments. In Computer Security Foundations Workshop X, Rockport, MA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A lightweight approach to specification and analysis of role-based access control extensions

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
        June 2002
        170 pages
        ISBN:1581134967
        DOI:10.1145/507711
        • General Chair:
        • Ravi Sandhu,
        • Program Chair:
        • Elisa Bertino

        Copyright © 2002 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 June 2002

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate177of597submissions,30%

        Upcoming Conference

        SACMAT 2024

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader