Abstract
We formalize a Parametrized Role-Based Access Control in the language Maude. We demonstrate how this formalization can be used to specify a row level access control policy in a database and how module algebra capabilities of Maude assist in modularization of such specification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The Virtual Private Database in Oracle9ir2. An Oracle White Paper (2002)
Abdallah, A., Khayat, E.: A Formal Model for Parameterized Role-Based Access Control. In: Dimitrakos, T., Martinelli, F. (eds.) Formal Aspects in Security and Trust, IFIP, vol. 173, pp. 233–246. Springer, Boston (2005)
Barker, S., Fernandez, M.: Term Rewriting for Access Control. In: Damiani, E., Liu, P. (eds.) DBSec 2006. LNCS, vol. 4127, pp. 179–193. Springer, Heidelberg (2006)
Bell, D., LaPadula, L.: Secure Computer Systems: Mathematical Foundations and Model. The MITRE Corporation Technical Report M74-244 (May 1973)
Bouhoula, A., Jouannaud, J.P., Meseguer, J.: Specification and Proof in Membership Equational Logic. Tech. rep., SRI International (1988)
Bourdier, T., Cirstea, H., Jaume, M., Kirchner, H.: On Formal Specification and Analysis of Security Policies, preprint inria-0042924
Clavel, M., Durán, F., Eker, S., Lincoln, P., Marti-Oliet, N., Meseguer, J., Talcott, C.: Maude Manual, Version 2.6 (2011)
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 System. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 76–87. Springer, Heidelberg (2003)
Denker, G., Meseguer, J., Talcott, C.: Protocol Specification and Analysis in Maude. In: Workshop on Formal Methods and Security Protocols (1998)
Dougherty, D.J., Kirchner, C., Kirchner, H., De, A.S.: Modular Access Control via Strategic Rewriting. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 578–593. Springer, Heidelberg (2007)
Ferraiolo, D., Kuhn, D., Chandramouli, R.: Role-Based Access Control. Artech House computer security series. Artech House, Boston (2003)
Ge, M., Osborn, S.: A Design for Parameterized Roles. In: Farkas, C., Samarati, P. (eds.) DBSec. IFIP, vol. 144, pp. 251–264, Kluver (2004)
Goguen, J.A., Meseguer, J.: Order-Sorted Algebra i: Equational Deduction for Multiple Inheritance, Overloading, Exceptions and Partial Operations. Theor. Comput. Sci. 105, 217–273 (1992)
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible Support for Multiple Access Control Policies. ACM Trans. Database Syst. 26(2), 214–260 (2001)
Kuhn, D.R., Coyne, E.J., Weil, T.R.: Adding Attributes to Role-Based Access Control. IEEE Computer 43(6), 79–81 (2010)
Martí-Oliet, N., Meseguer, J.: Rewriting Logic as a Logical and Semantic Framework. In: Meseguer, J. (ed.) Electronic Notes in Theoretical Computer Science, vol. 4. Elsevier Science Publishers, Amsterdam (2000)
Meseguer, J.: Membership Algebra as a Logical Framework for Equational Specification. In: Parisi-Presicce, F. (ed.) WADT 1997. LNCS, vol. 1376, pp. 18–61. Springer, Heidelberg (1998)
Miodek, K., Pychowski, J.: Elastyczny System Uprawnień Użytkowników w Systemie Zarządzania Bazą Danych PostgreSQL. In: Bazy Danych - Modele, Technologie, Narzedzia, pp. 309–314. WKL Gliwice (2006)
de Oliveira, A.S.: Rewriting-Based Access Control Policies. Electr. Notes Theor. Comput. Sci. 171(4), 59–72 (2007)
Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending Query Rewriting Techniques for Fine-Grained Access Control. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 551–562 (2004)
Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST Model for Role-Based Access Control: Towards A Unified Standard. In: Proceedings of the Fifth ACM Workshop on Role-based Access Control, pp. 47–63 (2000)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Stoller, S.D., Yang, P., Gofman, M.I., Ramakrishnan, C.: Symbolic Reachability Analysis for Parameterized Administrative Role-Based Access Control. Computers & Security 30(2-3), 148–164 (2011)
Stonebraker, M., Wong, E.: Access Control in a Relational Database Management System by Query Modification. In: Proceedings of the 1974 Annual Conference ACM 1974, vol. 1, pp. 180–186. ACM, New York (1974)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Sobieski, Ś., Zieliński, B. (2011). Modularisation in Maude of Parametrized RBAC for Row Level Access Control. In: Eder, J., Bielikova, M., Tjoa, A.M. (eds) Advances in Databases and Information Systems. ADBIS 2011. Lecture Notes in Computer Science, vol 6909. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23737-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-23737-9_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-23736-2
Online ISBN: 978-3-642-23737-9
eBook Packages: Computer ScienceComputer Science (R0)