An Administrative Model for Spatio-Temporal Role Based Access Control

  • Manisha Sharma
  • Shamik Sural
  • Vijayalakshmi Atluri
  • Jaideep Vaidya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8303)


In the present computing environment, access control decisions are often based on contextual information like the location of users and objects as well as the time of making an access request. Several variants of Role based Access Control (RBAC) have recently been proposed that support spatio-temporal policy specifications. However, unlike the administrative models available for RBAC, there is no reported literature on complete administrative models for spatio-temporal role based access control. In this paper, we introduce an administrative model for the recently proposed ESTARBAC (Enhanced Spatio-temporal Role based Access Control) model and name it as ADMINESTAR (Administrative model for Enhanced Spatio-Temporal Role based Access Control). ADMINESTAR defines a broad range of administrative rules and administrative operations. An instance of the set of administrative rules frames the currently effective administrative policy for the system. Administrative rules specify which administrative role can change which ESTARBAC entity. These ESTARBAC entities together define the system state which can be changed by administrative operations upon their successful execution under the control of defined administrative policies. ADMINESTAR would help in practical deployment of spatio-temporal role based access control systems and also provide a means for their formal security analysis.


Administrative Model Spatio-Temporal Access Control Administrative Rules Administrative Operations Role Hierarchy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer, 38–47 (1996)Google Scholar
  2. 2.
    Osborn, S.: Mandatory access control and role-based access control revisited. In: Proc. of the 2nd ACM Workshop on Role-Based Access Control, RBAC 1997, pp. 31–40 (1997)Google Scholar
  3. 3.
    Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC), 85–106 (2000)Google Scholar
  4. 4.
    Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Proc. of the IFIP WG11.3 Conference on Data and Applications Security and Privacy (DBSec), pp. 211–226 (2007)Google Scholar
  5. 5.
    Aich, S., Sural, S., Majumdar, A.: STARBAC: spatio tempor al role based access control. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1567–1582. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Aich, S., Mondal, S., Sural, S., Majumdar, A.K.: Role based access control with spatio-temporal context for mobile applications. Transactions on Computational Science IV, 177–199 (2009)Google Scholar
  7. 7.
    Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security (TISSEC), 105–135 (1999)Google Scholar
  8. 8.
    Li, N., Mao, Z.: Administration in Role-Based Access Control. In: Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 127–138 (2007)Google Scholar
  9. 9.
    Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A temporal role based access control model. ACM Transactions on Information and System Security, 191–233 (2001)Google Scholar
  10. 10.
    Toahchoodee, M., Ray, I.: On the formalization and analysis of a spatio-temporal role-based access control model. Journal of Computer Security, 399–452 (2011)Google Scholar
  11. 11.
    Toahchoodee, M., Ray, I.: Using alloy to analyse a spatio-temporal access control model supporting delegation. IET Information Security, 75–113 (2009)Google Scholar
  12. 12.
    Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: A spatially aware RBAC. ACM Transactions on Information and System Security, 29–37 (2007)Google Scholar
  13. 13.
    Ray, I., Kumar, M., Yu, L.: LRBAC: A Location-Aware Role-Based Access Control Model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Li, N., Tripunitara, M.: Security analysis in role-based access control. ACM Transactions on Information and System Security, 391–420 (2006)Google Scholar
  15. 15.
    Jha, S., Li, N., Tripunitara, M., Wang, Q., Winsborough, W.: Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing, 242–255 (2008)Google Scholar
  16. 16.
    Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 4–23 (2005)Google Scholar
  17. 17.
    Sandhu, R., Munawer, Q.: The ARBAC99 model for administration of roles. In: Proc. of the 15th Annual Computer Security Applications Conference, ACSAC 1999, pp. 229–238 (1999)Google Scholar
  18. 18.
    Sandhu, R., Oh, S.: A model for role administration using organization structure. SACMAT 2002. In: Proc. of the 7th ACM Symposium on Access Control Models and Technologies, pp. 155–162 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Manisha Sharma
    • 1
  • Shamik Sural
    • 1
  • Vijayalakshmi Atluri
    • 2
  • Jaideep Vaidya
    • 3
  1. 1.School of Information TechnologyIIT KharagpurIndia
  2. 2.National Science Foundation and MSIS DepartmentRutgers UniversityUSA
  3. 3.MSIS DepartmentRutgers UniversityUSA

Personalised recommendations