Configuring Role-Based Access Control To Enforce Mandatory and Discretionary Access Control Policies (2000)
Configuring Role-Based Access Control To Enforce Mandatory and Discretionary Access Control Policies (2000)
Configuring Role-Based Access Control To Enforce Mandatory and Discretionary Access Control Policies (2000)
Read-down
Write-equal
The General Construction
Construction1 (Liberal *-Property) (write-up)
R = {L1R. . . LnR, L1W. . . LnW}
RH which consists of two disjoint role hierarchies. The first role hierarchy
consists of the “read“ roles {L1R. . . LnR} and has the same partial
order as ≥LBAC ; the second partial consists of the “write” roles
{L1W. . . LnW} and has a partial order which is the inverse of ≥LBAC .
Constraint on UA: Each user is assigned to exactly two roles xR and LW where x is the label
assigned to the user and LW is the write role corresponding to the lowermost security
level according to ≥ LBAC
Constraint on sessions: Each session has exactly two roles yR and yW
Constraints on PA:
(o,r) is assigned to xR iff (o,w) is assigned to xW
(o,r) is assigned to exactly one role xR such that x is the label of o
Some other constructions
Construction 2. (Strict *-Property) Identical to
Construction 1 except RH has a partial order among
the read roles identical to the LBAC partial order, and
no relationships among the write roles.
Construction 3. (Liberal *-Property with Trusted
Range)
Construction 4. (Liberal *-Property with Independent
Write Range)
Construction 5. (Strict *-Property with Designated
Write)
DAC Models
DAC is that the owner of an object, who is usually its
creator, has discretionary authority over who else can
access that object.
DAC can be simulated in RBAC
The DAC policies:
The creator of an object becomes its owner.
There is only one owner of an object.
Destruction of an object can only be done by its owner.
Variations of DAC
Strict DAC requires that the owner is the only one who has
discretionary authority to grant access to an object and that
ownership cannot be transferred.
Liberal DAC allows the owner to delegate discretionary
authority for granting access to an object to other users.
Variations of liberal DAC
One Level Grant: The owner can delegate grant authority to other
users but they cannot further delegate this power.
Two Level Grant: In addition to a one-level grant the owner can allow
some users to further delegate grant authority to other users.
Multilevel Grant:
DAC with Change of Ownership: This variation allows a
user to transfer ownership of an object to another user.
Configuring RBAC for DAC
The basic idea is to simulate the owner-centric policies of
DAC using roles that are associated with each object.
Create an Object. For every object O that is created, three
administrative roles and one regular role are also created.
Eight Permissions
creating the following eight permissions along with
creation of each object O.
— canRead_O: It is assigned to the role READ_O.
— destroyObject_O: It is assigned to the role OWN_O.
— addReadUser_O, deleteReadUser_O: They are assigned
to the role PARENT_O.
— addParent_O, deleteParent_O:They are assigned to the
role PARENTwithGRANT_O.
— addParentWithGrant_O, deleteParentWithGrant_O:
They are assigned to the role OWN_O.
Strict DAC
Only the owner can grant/revoke read access
to/from other users.
The creator is the owner of the object.
Membership of the three administrative roles
cannot change.
This policy can be enforced by imposing a
cardinality constraint of 1 on OWN_O and of 0 on
PARENT_O and PARENTwithGRANT_O.
This policy could be simulated using just two
roles OWN_O and READ_O, and giving the
addReadUser_O and deleteReadUser_O
permissions directly to OWN_O at creation of O.
Liberal DAC
One-Level Grant. The one-level grant DAC policy can be
simulated by removing the cardinality constraint of strict DAC
on membership in PARENT_O. The owner can assign users to
the PARENT_O role who in turn can assign users to the
READ_O role. But the cardinality constraint of 0 on
PARENTwithGRANT_O remains.
Two-Level Grant.
Multilevel Grant.
DAC with Change of Ownership
…
Conclusion
This paper has shown common forms of LBAC and DAC
models can be simulated and enforced in RBAC96 with
systematic constructions.
Users and permissions are essential to express any access
control model.
The Role Hierarchy is important in the LBAC simulation.
The Administrative Role Hierarchy is essential in the
enforcement of DAC policies.
Constraints play a role in all of the constructions.
LBAC simulation assumes a single administrative role,
whereas the DAC simulation requires a large number of
administrative roles, which are dynamically created and
destroyed.