Abstract
This paper shows how to extend RBAC sessions with dynamic aspects to deal with user switch. Users can authenticate using their functions which will create a dynamic session and automatically activate a set of privileges associated with this function. A dynamic session can be joined, leaved, restarted and reused by authorized users. Moreover, a user can switch the session to another user in order to continue the task by preserving the working context. We discuss in this paper how to manage users privileges in the dynamic session and how to deal with the switch mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Autrel, F., Cuppens, F., Cuppens, N., Coma, C.: MotOrBAC 2: A Security Policy Tool. In: SARSSI (2008)
Autrel, F., Cuppens-Boulahia, N., Cuppens, F.: Reaction Policy Model Based on Dynamic Organizations and Threat Context. In: Gudes, E., Vaidya, J. (eds.) Data and Applications Security 2009. LNCS, vol. 5645, pp. 49–64. Springer, Heidelberg (2009)
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: An Extended Role-Based Access Control Model for Delegating Obligations. In: Fischer-Hübner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol. 5695, pp. 127–137. Springer, Heidelberg (2009)
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: A Delegation Model for Extended RBAC. The International Journal of Information Security (IJIS) 9(3) (June 2010)
Crampton, J., Khambhammettu, H.: Delegation in Role-Based Access Control. International Journal of Information Security (September 2008)
Cuppens, F., Cuppens-Boulahia, N.: Modeling Contextual Security Policies. International Journal of Information Security 7(4) (2008)
Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC Model and application in a network environment. In: FCS (2004)
Cuppens, F., Cuppens-Boulahia, N., Nuadi, M.: Smatch Model: Extending RBAC Sessions in Virtualization Environment. In: ARES (2011)
Cuppens, F.C., Cuppens-Boulahia, N., Coma, C.: Multi-Granular Licences to Decentralize Security Administration. In: SSS/WRAS (2007)
El-Rakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: From Contextual Permission to Dynamic Pre-Obligation. In: ARES (2010)
Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. Data & Knowledge Engineering (2011)
EYEOS, http://www.eyeos.org/
Hasebe, K., Mabuchi, M., Matsushita, A.: Capability-Based Delegation Model in RBAC. In: SACMAT (2010)
Ray, I., Toahchoodee, M.: A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. In: Furnell, S.M., Katsikas, S.K., Lioy, A. (eds.) TrustBus 2008. LNCS, vol. 5185, pp. 48–58. Springer, Heidelberg (2008)
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Schaad, A., Moffett, J.D.: Delegation of Obligations. In: POLICY (2002)
Oh, S., Park, S.: Task-Role-based Access Control Model. Information Systems 28 (2003)
Ullman, J.D.: Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies. W. H. Freeman & Co., New York (1990)
Yao, L., Kong, X., Xu, Z.: A Task-Role Based Access Control Model With Multi-Constraints. In: NCM (2008)
Zhang, L., Luo, L., Zhang, L., Geng, T., Yue, Z.: Task-Role-Based Access Control in Application on MIS. In: APSCC (2006)
Zhang, X., Oh, S., Sandhu, R.: Pbdm: A Flexible Delegation Model in RBAC. In: SACMAT (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ghorbel-Talbi, M.B., Cuppens, F., Cuppens-Boulahia, N., Morucci, S. (2013). Towards Session-Aware RBAC Delegation: Function Switch. In: Di Pietro, R., Herranz, J., Damiani, E., State, R. (eds) Data Privacy Management and Autonomous Spontaneous Security. DPM SETOP 2012 2012. Lecture Notes in Computer Science, vol 7731. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35890-6_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-35890-6_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35889-0
Online ISBN: 978-3-642-35890-6
eBook Packages: Computer ScienceComputer Science (R0)