Abstract
Constraints are an important aspect of role-based access control (RBAC). Constraints have to be satisfied when an administrator wants to assign (revoke) a role to a user or a permission to a role. The importance of constraints associated with user-role assignments and permission-role assignments in RBAC has been recognized but the modelling of these constraints has not been received much attention. In this paper we use a de facto constraints specification language in software engineering to analyze the constraints in user-role assignments and permission-role assignments. We show how to represent role-based access constraints with object constraint language (OCL) and discuss the future work. Finally, comparisons with other related work are presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ahn, G., Sandhu, R.: Role-based authorization constraints specification. Information and System Security 3(4), 207–226 (2000)
Ahn, G., Shin, M.: Role-Based Authorization Constraints Specification Using Object Constraint Language. In: Tenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 157–165 (2001)
Ahn, G.J., Sandhu, R.: The RSL 1999 Language for Role-Based Separation of Duty Constraints. In: 4th ACM Workshop on Role-Based Access Control, Fairfax, VA, pp. 43–54 (1999)
Bertino, E., Castano, S., Ferrari, E., Mesiti, M.: Specifying and enforcing access control policies for XML document sources. In: World Wide Web, vol. 3, pp. 139–151. Baltzer Science Publishers BV (2000)
Chen, F., Sandhu, R.: Constraints for Role-Based Access Control. In: First ACM Workshop on Role-Based Access Control, pp. 39-46 (1995)
Feinstein, H.L.: Final report: NIST small business innovative research (SBIR) grant: role based access control: phase 1. Technical report. SETA (1995)
Ferraiolo, D., Cugini, J., Kuhn, R.: Role-based Access Control (RBAC): Features and motivations. In: The 11th Annual Computer Security Applications Conference, New Orleans, LA, pp. 241–248 (1995)
Ferraiolo, D.F., Kuhn, D.R.: Role based access control. In: 15th National Computer Security Conference, pp. 554-563 (1992)
Goldschlag, D., Reed, M., Syverson, P.: Onion routing for anonymous and private Internet connections. Communications of the ACM 24, 39–41 (1999)
Oh, S., Sandhu, R.: A model for role administration using organization structure. In: Seventh ACM Symposium on Access Control Models and Technologies, Monterey, California, USA, pp. 155–162. ACM Press, New York (2002)
Richters, M., Gogolla, M.: On Formalizing the UML Object Constraint Language OCL. In: Ling, T.-W., Ram, S., Li Lee, M. (eds.) ER 1998. LNCS, vol. 1507, pp. 449–464. Springer, Heidelberg (1998)
Rumbaugh, J., Jacobson, I., Booch, G.: The Unified Modeling Language Reference Manual. Addison-Wesley publisher, MA (1999)
Sandhu, R.: Role-Based Access Control. Advances in Computers 46 (1998)
Sandhu, R., Munawer, Q.: The ARBAC99 model for administration of roles. In: The Annual Computer Security Applications Conference, Monterey, California, USA, pp. 229–238. ACM Press, New York (1999)
Wang, H., Cao, J., Zhang, Y.: A consumer anonymity scalable payment scheme with role based access control. In: 2nd International Conference on Web Information Systems Engineering (WISE 2001), Kyoto, Japan, pp. 53–62 (2001)
Wang, H., Cao, J., Zhang, Y.: Formal Authorization allocation approaches for role-based access control based on relational algebra operations. In: 3nd International Conference on Web Information Systems Engineering (WISE 2002), Singapore, pp. 301–312 (2002)
Wang, H., Cao, J., Zhang, Y.: Ticket-Based Service Access Scheme for Mobile Users. In: Oudshoorn, M. (ed.) Proceedings of Twenty-Fifth Australian Computer Science Conference, Melbourne, Victoria, pp. 178–187 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, H., Zhang, Y., Cao, J., Yang, J. (2004). Specifying Role-Based Access Constraints with Object Constraint Language. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds) Advanced Web Technologies and Applications. APWeb 2004. Lecture Notes in Computer Science, vol 3007. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24655-8_75
Download citation
DOI: https://doi.org/10.1007/978-3-540-24655-8_75
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21371-0
Online ISBN: 978-3-540-24655-8
eBook Packages: Springer Book Archive