Skip to main content

Advertisement

SpringerLink
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
Book cover

IFIP Annual Conference on Data and Applications Security and Privacy

DBSec 2006: Data and Applications Security XX pp 148–162Cite as

  1. Home
  2. Data and Applications Security XX
  3. Conference paper
Resolving Information Flow Conflicts in RBAC Systems

Resolving Information Flow Conflicts in RBAC Systems

  • Noa Tuval18 &
  • Ehud Gudes18,19 
  • Conference paper
  • 595 Accesses

  • 4 Citations

Part of the Lecture Notes in Computer Science book series (LNISA,volume 4127)

Abstract

Recently, Role Based Access Control (RBAC) model has taken place as a promising alternative to the conventional access control models, MAC and DAC. RBAC is more general than those traditional models as was shown by Osborn et al. [17], however, mapping a role based system to a valid MAC configuration is not always possible because certain combinations of permissions that are included in a role’s effective privileges may cause information flow. Given a role-based graph where role’s permissions refer to labeled data objects, Osborn et al. showed how to find conflicts that are resulted from information flow, but they have not suggested a solution for these conflicts and they have not handled user-role assignments, for the solved scheme. In this paper, we assume a more general model of permissions conflicts than MAC. We introduce an algorithm that handles information flow conflicts in a given role-based graph, corrects the Role-based graph if needed, and proposes a consistent users-roles assignment. As RBAC and information flow are becoming extremely important in Web based information systems, this algorithm becomes very relevant.

Keywords

  • Role based access control
  • role graph consistency
  • canonical groups

Chapter PDF

Download to read the full chapter text

References

  1. Ahn, G.J.: Specification and Classification of Role-Based Authorization Policies. IEEE Computer Society, Los Alamitos (2003)

    CrossRef  Google Scholar 

  2. Belokosztolszki, A., Eyers, D., Moody, K.: Policy Contexts: Controlling Information Flow in Parameterised RBAC. IEEE Computer Society Press, Los Alamitos (2003)

    MATH  Google Scholar 

  3. Belsis, P., Gritzalis, S.: A scalable Security Architecture enabling coalition formation between autonomous domains. In: Proceedings of ISSPIT 2005, Athens, Greece (2005)

    Google Scholar 

  4. Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Systems. Security 2(1), 65–104 (1999)

    CrossRef  Google Scholar 

  5. Bertino, E., Joshi, J., Bhatti, R., Ghafoor, A.: Access-Control Language for Multidomain Environments. IEEE Internet Computing 8(6), 40–50 (2004)

    CrossRef  Google Scholar 

  6. Christofides, N.: An Algorithm for the Chromatic Number of a Graph. Computer J. 14, 38–39 (1971)

    CrossRef  MathSciNet  MATH  Google Scholar 

  7. Cormen, T., Leiserson, C., Rivest, R.: Introduction to Algorithms, vol. 83(89), pp. 506–539. MIT Press, Cambridge (1990)

    MATH  Google Scholar 

  8. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)

    CrossRef  Google Scholar 

  9. Gramm, J., Guo, J., Huffner, F., Niedermeir, R.: Data Reduction, Exact and Heuristic Algorithms for Clique Cover. In: Proceedings of the 8th Workshop on Algorithm Engineering and Experiments (ALENEX 2006), Miami, USA (January 2006)

    Google Scholar 

  10. Ionita, C.M., Osborn, S.: Privilege administration for the role graph model. In: Proc.IFIP WG11.3 Working Conference on Database Security (July 2002)

    Google Scholar 

  11. Joshi, J., Bertino, E., Shafiq, B., Ghafoor, A.: Dependencies and Separation of Duty Constraints in GTRBAC. In: SACMAT 2003, June 2-3 (2003)

    Google Scholar 

  12. Moodahi, I., Gudes, E., Lavee, O., Meisels, A.: A Secure Workflow Model Based on Distributed Constrained Role and Task Assignment for the Internet. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 171–186. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  13. Moodahi, I., Gudes, E., Meisels, A.: A three tier architecture for Role/User assignment for the Internet (submitted for a journal publication)

    Google Scholar 

  14. Myers, A.C., Liskov, B.: A Decentralized Model for Information Flow Control. In: Proceedings of the 16th ACM Symposium on Operating Systems Principles, Saint-Malo, France (October 1997)

    Google Scholar 

  15. Nyanchama, M., Osborn, S.: The Role Graph Model and Conflict of Interest. ACM Transactions on Information and Systems Security 2(1), 3–33 (1999)

    CrossRef  Google Scholar 

  16. Osborn, S.: Information Flow Analysis of an RBAC system. In: SACMAT 2002, June 3-4 (2002)

    Google Scholar 

  17. Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to enforce Mandatory and Discretionary access control policies. ACM Trans. Information and system security 3(2), 1–23 (2000)

    CrossRef  Google Scholar 

  18. Samarati, P., Bertino, E., Ciampichetti, A., Jajodia, S.: Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4), 524–538 (1997)

    CrossRef  Google Scholar 

  19. Sandhu, R.: Lattice-based access control models. IEEE Computer 26(11), 9–19 (1993)

    CrossRef  Google Scholar 

  20. Sandhu, R.: Role Hierarchies and constraints for lattice-based Access Controls. In: Proc. Fourth European on Research in Computer Security, Rome, Italy, September 25-27 (1996)

    Google Scholar 

  21. Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38–47 (1996)

    CrossRef  Google Scholar 

  22. Skiena, S.: Finding a Vertex Coloring, 5.5.3 in Implementing Descrete Mathematics: Combinatorics and Graph Theory with Mathematica, pp. 141, 214–215. Addison-Wesley, Reading (1990)

    Google Scholar 

  23. Wang, H., Osborn, S.: An Administrative Model for Role Graphs. In: Proc. IFIP WG11.3 Working Conference on Database Security, Estes Park, Colorado (2003)

    Google Scholar 

  24. Wilf, H., Backtrack: An O(1) Expected Time Algorithm for the Graph Coloring Problem. Info. Proc. Let. 18, 119–121 (1984)

    CrossRef  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science, Open University, Raanana, Israel

    Noa Tuval & Ehud Gudes

  2. Department of Computer Science, Ben-Gurion University, Beer-Sheva, Israel

    Ehud Gudes

Authors
  1. Noa Tuval
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Ehud Gudes
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Dipartimento di Tecnologie dell’Informazione, Università degli Studi di Milano, Italy

    Ernesto Damiani

  2. The Logistics Institute, Northeastern University, Shenyang, China

    Peng Liu

Rights and permissions

Reprints and Permissions

Copyright information

© 2006 IFIP International Federation for Information Processing

About this paper

Cite this paper

Tuval, N., Gudes, E. (2006). Resolving Information Flow Conflicts in RBAC Systems. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_11

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/11805588_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-36796-3

  • Online ISBN: 978-3-540-36799-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our imprints

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Cancel contracts here

167.114.118.210

Not affiliated

Springer Nature

© 2023 Springer Nature