DBSec 2013: Data and Applications Security and Privacy XXVII pp 297-304 | Cite as
Analysis of TRBAC with Dynamic Temporal Role Hierarchies
Abstract
The temporal role based access control (TRBAC) models support the notion of temporal roles, user-to-role and permission-to-role assignment, as well as allow role enabling. In this paper, we argue that role hierarchies can be temporal in nature with a dynamism that allows it to have a different structure in different time intervals; and safety analysis of such extensions is crucial. Towards this end, we propose the temporal role based access control model extended with dynamic temporal role hierarchies, denoted as TRBACRH, and offer an approach to perform its safety analysis. We also present an administrative model to govern changes to the proposed role hierarchy.
References
- 1.Barka, E., Sandhu, R., et al.: A role-based delegation model and some extensions. In: NISSC, vol. 4, pp. 49–58 (2000)Google Scholar
- 2.Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role based access control model. ACM Transactions on Information and System Security 4(3), 191–233 (2001)CrossRefGoogle Scholar
- 3.Crampton, J., Khambhammettu, H.: Delegation in role-based access control. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 174–191. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 4.Guo, Q., Vaidya, J., Atluri, V.: The role hierarchy mining problem: Discovery of optimal role hierarchies. In: ACSAC 2008, pp. 237–246. IEEE (2008)Google Scholar
- 5.Joshi, J.B.D., Bertino, E.: Fine-grained role-based delegation in presence of the hybrid role hierarchy. In: SACMAT, pp. 81–90 (2006)Google Scholar
- 6.Joshi, J.B.D., Bertino, E., Ghafoor, A.: Hybrid role hierarchy for generalized temporal role based access control model. In: COMPSAC 2002, pp. 951–956. IEEE (2002)Google Scholar
- 7.Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4–23 (2005)CrossRefGoogle Scholar
- 8.Sandhu, R., Bhamidipati, V., Coyne, E., Ganta, S., Youman, C.: The ARBAC97 model for role-based administration of roles: preliminary description and outline. In: ACM Workshop on Role-Based Access Control, pp. 41–50 (1997)Google Scholar
- 9.Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)CrossRefGoogle Scholar
- 10.Uzun, E., Atluri, V., Sural, S., Vaidya, J., Parlato, G., Ferrara, A., Parthasarathy, M.: Analyzing temporal role based access control models. In: SACMAT. ACM (2012)Google Scholar
- 11.Zhang, L., Ahn, G.J., Chu, B.T.: A rule-based framework for role-based delegation and revocation. TISSEC 6(3), 404–441 (2003)CrossRefGoogle Scholar
- 12.Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: SACMAT, pp. 149–157. ACM (2003)Google Scholar