Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ACSAC.2009.12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

How to Securely Break into RBAC: The BTG-RBAC Model

Published: 07 December 2009 Publication History
  • Get Citation Alerts
  • Abstract

    Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. RBAC is a rigid model where access control decisions have only two output options: Grant or Deny. Break The Glass (BTG) policies on the other hand are flexible and allow users to break or override the access controls in a controlled and justifiable manner. The main objective of this paper is to integrate BTG within the NIST/ANSI RBAC model in a transparent and secure way so that it can be adopted generically in any domain where unanticipated or emergency situations may occur. The new proposed model, called BTG-RBAC, provides a third decision option BTG, which grants authorized users permission to break the glass rather than be denied access. This can easily be implemented in any application without major changes to either the application code or the RBAC authorization infrastructure, apart from the decision engine. Finally, in order to validate the model, we discuss how the BTG-RBAC model is being introduced within a Portuguese healthcare institution where the legislation requires that genetic information must be accessed by a restricted group of healthcare professionals. These professionals, advised by the ethical committee, have required and asked for the implementation of the BTG concept in order to comply with the said legislation.

    Cited By

    View all
    • (2023)AC-ABACExpert Systems with Applications: An International Journal10.1016/j.eswa.2022.119271213:PCOnline publication date: 1-Mar-2023
    • (2019)SoTRAACE for smart security in ambient assisted livingJournal of Ambient Intelligence and Smart Environments10.3233/AIS-19053111:4(323-334)Online publication date: 1-Jan-2019
    • (2019)Secure Social Model Based on IRBAC MobileProceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences10.1145/3312662.3312674(88-92)Online publication date: 12-Jan-2019
    • Show More Cited By

    Index Terms

    1. How to Securely Break into RBAC: The BTG-RBAC Model
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Guide Proceedings
          ACSAC '09: Proceedings of the 2009 Annual Computer Security Applications Conference
          December 2009
          492 pages
          ISBN:9780769539195

          Publisher

          IEEE Computer Society

          United States

          Publication History

          Published: 07 December 2009

          Author Tags

          1. Access control model
          2. Break The Glass
          3. NIST Core RBAC
          4. Obligations

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 12 Aug 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2023)AC-ABACExpert Systems with Applications: An International Journal10.1016/j.eswa.2022.119271213:PCOnline publication date: 1-Mar-2023
          • (2019)SoTRAACE for smart security in ambient assisted livingJournal of Ambient Intelligence and Smart Environments10.3233/AIS-19053111:4(323-334)Online publication date: 1-Jan-2019
          • (2019)Secure Social Model Based on IRBAC MobileProceedings of the 2019 3rd International Conference on Management Engineering, Software Engineering and Service Sciences10.1145/3312662.3312674(88-92)Online publication date: 12-Jan-2019
          • (2019)Accessing a New LandProceedings of the 2019 CHI Conference on Human Factors in Computing Systems10.1145/3290605.3300411(1-12)Online publication date: 2-May-2019
          • (2019)Emergency role-based access control (E-RBAC) and analysis of model specifications with alloyJournal of Information Security and Applications10.1016/j.jisa.2019.01.00845:C(131-142)Online publication date: 1-Apr-2019
          • (2018)Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study PlatformsJournal of Medical Systems10.1007/s10916-017-0844-y42:1(1-19)Online publication date: 1-Jan-2018
          • (2017)A Flexible Authorization Architecture for Systems of Interoperable Medical DevicesProceedings of the 22nd ACM on Symposium on Access Control Models and Technologies10.1145/3078861.3078862(9-20)Online publication date: 7-Jun-2017
          • (2017)Protecting interoperable clinical environment with authenticationACM SIGBED Review10.1145/3076125.307612914:2(34-43)Online publication date: 31-Mar-2017
          • (2016)A Novel Reference Security Model with the Situation Based Access Policy for Accessing EPHR DataJournal of Medical Systems10.1007/s10916-016-0620-440:11(1-14)Online publication date: 1-Nov-2016
          • (2016)Access control and privilege management in electronic health recordJournal of Medical Systems10.1007/s10916-016-0589-z40:12(1-9)Online publication date: 1-Dec-2016
          • Show More Cited By

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media