skip to main content
10.1145/1266840.1266875acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Towards realizing a formal RBAC model in real systems

Published:20 June 2007Publication History

ABSTRACT

There still exists an open question on how formal models can be fully realized in the system development phase. The Model Driven Development (MDD) approach has been recently introduced to deal with such a critical issue for building high assurance software systems.

There still exists an open question on how formal models can be fully realized in the system development phase. The Model Driven Development (MDD) approach has been recently introduced to deal with such a critical issue for building high assurance software systems.

The MDD approach focuses on the transformation of high-level design models to system implementation modules. However, this emerging development approach lacks an adequate procedure to address security issues derived from formal security models. In this paper, we propose an empirical framework to integrate security model representation, security policy specification, and systematic validation of security model and policy, which would be eventually used for accommodating security concerns during the system development. We also describe how our framework can minimize the gap between security models and the development of secure systems. In addition, we overview a proof-of-concept prototype of our tool that facilitates existing software engineering mechanisms to achieve the above-mentioned features of our framework.

References

  1. The ArgoUML Project. http://argouml.tigris.org.Google ScholarGoogle Scholar
  2. Dresden OCL toolkit. http://dresden-ocl.sourceforge.net.Google ScholarGoogle Scholar
  3. The Octopus Project. http://www.klasse.nl/octopus.Google ScholarGoogle Scholar
  4. American National Standards Institute Inc. Role Based Access Control, ANSI-INCITS 359--2004, 2004.Google ScholarGoogle Scholar
  5. G.-J. Ahn and R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. (TISSEC), 3(4):207--226, November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G.-J. Ahn and M. E. Shin. Role-based authorization constraints specification using object constraint language. In Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 157--162, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. Alghathbar and D. Wijesekera. authUML: a three-phased framework to analyze access control specifications in use cases. In Proceedings of the 2003 ACM workshop on Formal methods in security engineering, pages 77--86, New York, NY, USA, 2003. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. (TISSEC), 5(4):492--540, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):191--233, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca. GEO-RBAC: a spatially aware RBAC. In Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT), pages 29--37, New York, NY, USA, 2005. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Chandramouli. Application of XML tools for enterprise-wide RBAC implementation tasks. In Proceedings of the fifth ACM workshop on Role-based access control, pages 11--18, Berlin, Germany, July 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F. Chen and R. S. Sandhu. Constraints for role-based access control. In Proceedings of the first ACM Workshop on Role-based access control, Gaithersburg, Maryland, United States, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Crampton. Specifying and enforcing constraints in role-based access control. In Proceedings of the eighth ACM symposium on Access control models and technologies (SACMAT), pages 43--50, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pages 18--38, Bristol, UK, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. D. Ferraiolo and D. Kuhn. Role based access control. In Proceedings of the fifth National Computer Security Conference, pages 554--563, 1992.Google ScholarGoogle Scholar
  16. D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):224--274, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. R. France. A problem-oriented analysis of basic UML static requirements modeling concepts. In Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pages 57--69, New York, NY, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. T. Jaeger. On the increasing importance of constraints. In Proceedings of the fourth ACM workshop on Role-based access control, pages 33--42, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Jaeger and J. Tidswell. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. (TISSEC), 4(3):158--190, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy, pages 31--42, Oakland, CA, May 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. J. Rumbaugh, I. Jacobson, and G. Booch. The Unified Modeling Language Reference Manual, Second Edition. Object Technology Series, Addison Wesley Longman, Reading, Mass, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Jürjens. UMLsec: Extending UML for secure systems development. In Proceedings of the 5th International Conference on The United Modeling Language, pages 412--425. Springer Verlag, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Koch, L. V. Mancini, and F. Parisi-Presicce. A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur. (TISSEC), 5(3):332--365, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-based modeling language for model-driven security, 2002.Google ScholarGoogle Scholar
  25. V. V. M. Hitchens. Tower: a language for role-based access control. In Proceedings of the International Workshop on Policies for Distributed Systems and Networks, pages 88--106, Bristol, UK, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  26. OASIS. XACML Language Proposal, Version 0.8. Technical Report, Organization for the Advancement of Structured Information Standards, 2002, Available electronically from http://www.oasisopen.org/committees/xacml.Google ScholarGoogle Scholar
  27. I. Ray, N. Li, R. France, and D. -K. Kim. Using UML to visualize role-based access control constraints. In Proceedings of the ninth ACM symposium on Access control models and technologies (SACMAT), pages 115--124, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. E. Shin and G. -J. Ahn. UML-based representation of role-based access control. In Proceedings of the 9th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 195--200, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. K. Sohr, G. -J. Ahn, and L. Migge. Articulating and enforcing authorisation policies with UML and OCL. In Proceedings of the 2005 workshop on Software engineering for secure systems building trustworthy applications, pages 1--7, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Tidswell and T. Jaeger. An access control model for simplifying constraint expression. In Proceedings of the 7th ACM conference on Computer and communications security, pages 154--163, Athens, Greece, November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. J. Warmer and A. Kleppe. The Object Constraint Language: Getting your models ready for MDA. Addison-Wesley, Reading/MA, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Towards realizing a formal RBAC model in real systems

                      Recommendations

                      Comments

                      Login options

                      Check if you have access through your login credentials or your institution to get full access on this article.

                      Sign in
                      • Published in

                        cover image ACM Conferences
                        SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
                        June 2007
                        254 pages
                        ISBN:9781595937452
                        DOI:10.1145/1266840

                        Copyright © 2007 ACM

                        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                        Publisher

                        Association for Computing Machinery

                        New York, NY, United States

                        Publication History

                        • Published: 20 June 2007

                        Permissions

                        Request permissions about this article.

                        Request Permissions

                        Check for updates

                        Qualifiers

                        • Article

                        Acceptance Rates

                        Overall Acceptance Rate177of597submissions,30%

                        Upcoming Conference

                        SACMAT 2024

                      PDF Format

                      View or Download as a PDF file.

                      PDF

                      eReader

                      View online with eReader.

                      eReader