Skip to main content

Tower: A Language for Role Based Access Control

  • Conference paper
  • First Online:
Policies for Distributed Systems and Networks (POLICY 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1995))

Abstract

A language for specifying role-based access control (RBAC) policies is presented. The language is designed to support the range of access control policies of commercial object systems. The basic structures of RBAC, such as role, users and permission, are present in the language as basic constructs. Examples are given in the language of access control situations, such as static and dynamic separation of duty, delegation and joint action based access policies. The language is flexible and is able to capture meta-level operations. The language also provides a mechanism for tracking actions and basing access control decisions on past events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bai, Y., and Varadharajan, V.: ‘A logic for state transformations in authorization policies”, Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport MA, USA, 1997, IEEE Computer Society Press, pp. 173–183.

    Google Scholar 

  2. Brewer, D. and Nash, M.: ‘The Chinese Wall security policy’. Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos CA, USA, 1989, pp. 206–214.

    Google Scholar 

  3. Ferraiolo, D., and Kuhn, R.: ‘Role based access controls’, Proceedings of the 15th NIST-NCSC National Computer Security Conference, Baltimore MD, USA, 1992, pp. 554–563.

    Google Scholar 

  4. Hilchenbach, B.“ ‘Observations on the real-world implementation of role-based ccess control”, Proceedings of the 20th National Information Systems Security Conference, Baltimore MD, USA, 1997, pp. 341–52.

    Google Scholar 

  5. M. Hitchens & V. Varadharajan, “Issues in the Design of a Language for Role Based Access Control”, ICICS’99, pp. 22–38.

    Google Scholar 

  6. Jajodia, S., Smarati, P., and Subrahmanian, V.: ‘A logical language for expressing authorizations”, Proceedings of the IEEE Symposium on Security and Information Privacy, Oakland CA, USA, 1997, pp. 31–42.

    Google Scholar 

  7. Karger, P.: ‘Implementing commercial data integrity with secure Capabilities’, Proceedings of the IEEE Symposium on Security and Privacy, Oakland CA, USA, 1988, pp. 130–39.

    Google Scholar 

  8. Object Management Group (OMG), “CORBAservices: Common Object Services Specification” and “Security Services in Common Object Request Broker Architecture”, 1996–98.

    Google Scholar 

  9. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C.: ‘Role-based access control: A Multi-Dimensional View”, 10th Annual Computer Security Applications Conference, Orlando FL, USA, 1994, IEEE CS Press, pp. 54–61.

    Google Scholar 

  10. Sandhu, R., and Feinstein, H.: ‘A three tier architecture for role-based access control’. Proceedings of the 17th NIST-NCSC National Computer Security Conference, Baltimore MD, USA, 1994, pp. 34–46.

    Google Scholar 

  11. Sandhu, R., Coyne, E.J., and Feinstein, H.L., ‘Role based access control models’, IEEE Computer, 1996, 29, (2), pp. 38–47.

    Google Scholar 

  12. Sandhu, R.: ‘Role Activation Hierarchies’, Proceedings of the 3rd ACM Workshop on Role Based Access Control, Fairfax VA, USA, 1998, pp. 33–40.

    Google Scholar 

  13. Simon, R., and Zurko, M.: ‘Separation of duty in role-based environments’. Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport MA, USA, IEEE CS Press, 1997, pp. 183–94.

    Google Scholar 

  14. Varadharajan, V. and Allen, P.: ‘Joint action based authorisation schemes’, ACM Operating Systems Review, volume 30, (3), July 1996, pp. 32–45.

    Article  Google Scholar 

  15. Varadharajan, V., Crall, C., and Pato, J.: ‘Authorization for enterprise wide distributed systems: Design and application”, Proceedings of the IEEE Computer Security Applications Conference, ACSAC’98, Scottsdale AZ, USA, 1998.

    Google Scholar 

  16. Zurko, M., Simon, R., and Sanfilippo, T.: ‘A user-centered, modular authorization service built on an RBAC foundation’, Proceedings of the IEEE Symposium on Security and Privacy, Oakland CA, USA, 1999. pp. 57–71.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hitchens, M., Varadharajan, V. (2001). Tower: A Language for Role Based Access Control. In: Sloman, M., Lupu, E.C., Lobo, J. (eds) Policies for Distributed Systems and Networks. POLICY 2001. Lecture Notes in Computer Science, vol 1995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44569-2_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-44569-2_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41610-4

  • Online ISBN: 978-3-540-44569-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics