Analysis of TRBAC with Dynamic Temporal Role Hierarchies

  • Emre Uzun
  • Vijayalakshmi Atluri
  • Jaideep Vaidya
  • Shamik Sural
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7964)

Abstract

The temporal role based access control (TRBAC) models support the notion of temporal roles, user-to-role and permission-to-role assignment, as well as allow role enabling. In this paper, we argue that role hierarchies can be temporal in nature with a dynamism that allows it to have a different structure in different time intervals; and safety analysis of such extensions is crucial. Towards this end, we propose the temporal role based access control model extended with dynamic temporal role hierarchies, denoted as TRBACRH, and offer an approach to perform its safety analysis. We also present an administrative model to govern changes to the proposed role hierarchy.

References

  1. 1.
    Barka, E., Sandhu, R., et al.: A role-based delegation model and some extensions. In: NISSC, vol. 4, pp. 49–58 (2000)Google Scholar
  2. 2.
    Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role based access control model. ACM Transactions on Information and System Security 4(3), 191–233 (2001)CrossRefGoogle Scholar
  3. 3.
    Crampton, J., Khambhammettu, H.: Delegation in role-based access control. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 174–191. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  4. 4.
    Guo, Q., Vaidya, J., Atluri, V.: The role hierarchy mining problem: Discovery of optimal role hierarchies. In: ACSAC 2008, pp. 237–246. IEEE (2008)Google Scholar
  5. 5.
    Joshi, J.B.D., Bertino, E.: Fine-grained role-based delegation in presence of the hybrid role hierarchy. In: SACMAT, pp. 81–90 (2006)Google Scholar
  6. 6.
    Joshi, J.B.D., Bertino, E., Ghafoor, A.: Hybrid role hierarchy for generalized temporal role based access control model. In: COMPSAC 2002, pp. 951–956. IEEE (2002)Google Scholar
  7. 7.
    Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4–23 (2005)CrossRefGoogle Scholar
  8. 8.
    Sandhu, R., Bhamidipati, V., Coyne, E., Ganta, S., Youman, C.: The ARBAC97 model for role-based administration of roles: preliminary description and outline. In: ACM Workshop on Role-Based Access Control, pp. 41–50 (1997)Google Scholar
  9. 9.
    Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)CrossRefGoogle Scholar
  10. 10.
    Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A., Parthasarathy, M.: Analyzing temporal role based access control models. In: SACMAT. ACM (2012)Google Scholar
  11. 11.
    Zhang, L., Ahn, G.J., Chu, B.T.: A rule-based framework for role-based delegation and revocation. TISSEC 6(3), 404–441 (2003)CrossRefGoogle Scholar
  12. 12.
    Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: SACMAT, pp. 149–157. ACM (2003)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2013

Authors and Affiliations

  • Emre Uzun
    • 1
  • Vijayalakshmi Atluri
    • 2
  • Jaideep Vaidya
    • 1
  • Shamik Sural
    • 3
  1. 1.MSIS DepartmentRutgers Business SchoolUSA
  2. 2.National Science Foundation and MSIS DepartmentRutgers Business SchoolUSA
  3. 3.School of Information TechnologyIIT KharagpurIndia

Personalised recommendations