Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2462410.2462415acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

ERBAC: event-driven RBAC

Published: 12 June 2013 Publication History

Abstract

Context-aware access control systems should reactively adapt access control decisions to dynamic environmental conditions. In this paper we present an extension of the TRBAC model that allows the specification and enforcement of general reactive policies. Then we extend XACML to support the new model, and illustrate a prototype implementation of the PDP.

References

[1]
XACML enterprise. http://code.google.com/p/enterprise-java-xacml/.
[2]
XACML light. http://sourceforge.net/projects/xacmllight/.
[3]
S. Aich, S. Mondal, S. Sural, and A. Majumdar. Role based access control with spatiotemporal context for mobile applications. In Transactions on Computational Science IV, volume 5430 of LNCS, pages 177--199. Springer, 2009.
[4]
S. Aich, S. Sural, and A. Majumdar. STARBAC: Spatiotemporal role based access control. In Proceedings of the 2007 OTM confederated international conference: CoopIS, DOA, ODBASE, GADA, and IS-Volume Part II, pages 1567--1582. Springer-Verlag, 2007.
[5]
J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur., 5(4):492--540, 2002.
[6]
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst., 23(3):231--285, 1998.
[7]
E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4:191--233, August 2001.
[8]
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms (3. ed.). MIT Press, 2009.
[9]
M. J. Covington, P. Fogla, Z. Zhan, and M. Ahamad. A context-aware security architecture for emerging applications. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC '02, pages 249--, Washington, DC, USA, 2002. IEEE Computer Society.
[10]
M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad, and G. D. Abowd. Securing context-aware applications using environment roles. In Proceedings of the sixth ACM symposium on Access control models and technologies, SACMAT '01, pages 10--20. ACM, 2001.
[11]
M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca. GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur., 10(1), 2007.
[12]
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224--274, 2001.
[13]
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas. Flexible team-based access control using contexts. In SACMAT, pages 21--27, 2001.
[14]
L. Giuri and P. Iglio. Role templates for content-based access control. In Second ACM Workshop on Role-Based Access Control, pages 153--159, 1997.
[15]
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng., 17(1):4--23, 2005.
[16]
D. Kulkarni and A. Tripathi. Context-aware role-based access control in pervasive computing systems. In 13th ACM Symposium on Access Control Models and Technologies (SACMAT 2008), pages 113--122, 2008.
[17]
D. Kulkarni and A. R. Tripathi. A framework for programming robust context-aware applications. IEEE Trans. Software Eng., 36(2):184--197, 2010.
[18]
OASIS Consortium. Core and hierarchical role based access control (rbac) profile of xacml v2.0. http://docs.oasis-open.org/xacml/2.0/access\_control-xacml-2.0-rbac-profile1%-spec-os.pdf.
[19]
OASIS Consortium. extensible access control markup language (XACML), v. 2.0.
[20]
OpenGIS Consortium. Geospatial eXtensible Access Control Markup Language (GeoXACML) v 1.0. http://www.opengeospatial.org/standards/geoxacml.
[21]
I. Ray, M. Kumar, and L. Yu. Lrbac: A location-aware role-based access control model. In A. Bagchi and V. Atluri, editors, ICISS, volume 4332 of Lecture Notes in Computer Science, pages 147--161. Springer, 2006.
[22]
I. Ray and M. Toahchoodee. A spatio-temporal role-based access control model. In S. Barker and G.-J. Ahn, editors, Data and Applications Security XXI, volume 4602 of Lecture Notes in Computer Science, pages 211--226. Springer Berlin / Heidelberg, 2007.
[23]
I. Ray and M. Toahchoodee. A spatio-temporal access control model supporting delegation for pervasive computing applications. Trust, Privacy and Security in Digital Business, pages 48--58, 2008.
[24]
G. Sampemane, P. Naldurg, and R. H. Campbell. Access control for active spaces. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC '02, pages 343--, Washington, DC, USA, 2002. IEEE Computer Society.
[25]
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996.
[26]
V. Solutions. JTS topology suite. http://www.vividsolutions.com/jts/jtshome.htm.
[27]
M. Strembeck and G. Neumann. An integrated approach to engineer and enforce context constraints in rbac environments. ACM Trans. Inf. Syst. Secur., 7(3):392--427, Aug. 2004.
[28]
Sun Microsystems. Sun's xacml implementation. http://sunxacml.sourceforge.net.
[29]
F. Turkmen and B. Crispo. Performance evaluation of XACML PDP implementations. In Proceedings of the 2008 ACM workshop on Secure web services, SWS '08, pages 37--44, New York, NY, USA, 2008. ACM.

Cited By

View all
  • (2022)Security Frameworks for Green Mobile Cloud ComputingGreen Mobile Cloud Computing10.1007/978-3-031-08038-8_6(133-150)Online publication date: 7-Oct-2022
  • (2021)Access Control Challenges in Enterprise EcosystemsResearch Anthology on Blockchain Technology in Business, Healthcare, Education, and Government10.4018/978-1-7998-5351-0.ch029(503-528)Online publication date: 2021
  • (2021)Access Control in Cyber-Physical Spaces Using Virtual PerimetersProceedings of Sixth International Congress on Information and Communication Technology10.1007/978-981-16-1781-2_34(369-378)Online publication date: 10-Sep-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '13: Proceedings of the 18th ACM symposium on Access control models and technologies
June 2013
278 pages
ISBN:9781450319508
DOI:10.1145/2462410
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 June 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RBAC
  2. event-driven access control

Qualifiers

  • Research-article

Conference

SACMAT '13
Sponsor:

Acceptance Rates

SACMAT '13 Paper Acceptance Rate 19 of 62 submissions, 31%;
Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Security Frameworks for Green Mobile Cloud ComputingGreen Mobile Cloud Computing10.1007/978-3-031-08038-8_6(133-150)Online publication date: 7-Oct-2022
  • (2021)Access Control Challenges in Enterprise EcosystemsResearch Anthology on Blockchain Technology in Business, Healthcare, Education, and Government10.4018/978-1-7998-5351-0.ch029(503-528)Online publication date: 2021
  • (2021)Access Control in Cyber-Physical Spaces Using Virtual PerimetersProceedings of Sixth International Congress on Information and Communication Technology10.1007/978-981-16-1781-2_34(369-378)Online publication date: 10-Sep-2021
  • (2021)Securing Smart Connected World: Key Challenges and Possible SolutionsSmart Connected World10.1007/978-3-030-76387-9_5(91-106)Online publication date: 28-Sep-2021
  • (2020)Improving Interoperability in Multi-domain Enterprise Right Management ApplicationsInformation Systems Security and Privacy10.1007/978-3-030-49443-8_18(382-402)Online publication date: 28-Jun-2020
  • (2019)Access Control Challenges in Enterprise EcosystemsGlobal Cyber Security Labor Shortage and International Business Risk10.4018/978-1-5225-5927-6.ch004(51-76)Online publication date: 2019
  • (2018)Achieving interoperability between federated identity management systemsJournal of High Speed Networks10.5555/2729958.272996120:4(209-221)Online publication date: 24-Dec-2018
  • (2018)Access Control Framework Using Dynamic Attributes Encryption for Mobile Cloud EnvironmentProgress in Advanced Computing and Intelligent Engineering10.1007/978-981-10-6872-0_59(611-621)Online publication date: 9-Feb-2018
  • (2017)Security Policy Model for Ubiquitous Social SystemsModeling and Using Context10.1007/978-3-319-57837-8_24(302-314)Online publication date: 4-May-2017
  • (2016)A Survey of Role MiningACM Computing Surveys10.1145/287114848:4(1-37)Online publication date: 22-Feb-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media