skip to main content
10.1145/1377836.1377850acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints

Published:11 June 2008Publication History

ABSTRACT

A key issue in RBAC systems is how to efficiently handle the user authorization process. That is, whether or not to grant a user's request to acquire a set of requested permissions or to activate a set of requested roles in a single session. The presence of hybrid hierarchies as well as the cardinality and dynamic separation of duty constraints make the issue more complex. In this paper, we define this issue as the user authorization query problem consisting of a role mapping problem and an activation checking problem. We also propose a set of algorithms to solve the role mapping and the activation checking problems. We show that our model is practical and flexible, and can deal with various cases in presence of the hybrid hierarchy and cardinality/DSoD constraints.

References

  1. S. M. Chandran, J. B. D. Joshi, "Towards Administration of a Hybrid Role Hierarchy", IEEE International Conference on Information Reuse and Integration, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  2. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to Algorithms", Second Edition, MIT Press, 2001, ISBN 0-262-03293-7 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. Du, and J. B. D. Joshi, "Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy," The 11th ACM Symposium on Access Control Models and Technologies, USA, June 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and Systems Security, vol. 4, no. 3, pp. 224--274, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "Generalized Temporal Role Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, Volume 7, Issue 1, Jan. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Temporal hierarchies and inheritance semantics for GTRBAC", In Proceedings of the 7th ACM symposium on Access control models and technologies, ACM Press, New York, NY, USA, 74--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. James, B.D. Joshi, Elisa Bertino, Arif Ghafoor and Yue Zhang, "Formal Foundations for hybrid hierarchies in GTRBAC", accepted by ACM Transactions on Information and System Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ninghui Li, Ji-Won Byun, Elisa Bertino, "A Critique of the ANSI Standard on Role-Based Access Control," IEEE Security and Privacy, vol. 5, no. 6, pp. 41--49, Nov/Dec, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. D. Moffett and E. C. Lupu, "The uses of role hierarchies in access control", Proceedings of the fourth ACM workshop on Role-based access control, Fairfax, Virginia, United States, 1999, pp. 153--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Piromruen, and J. B. D. Joshi, "An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environment", IEEE Workshop on Object-oriented Realtime Databases (WORDS-2005), 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models", IEEE Computer 29(2): 38--47, IEEE Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Sandhu, "Role activation hierarchies", Proceedings of the third ACM workshop on Role-based access control, Fairfax, Virginia, United States, 1998, pp. 33--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J.Barkley, A.V. Cincotta, D.F. Ferraiolo, S. Gavrila, , D.R. Kuhn, "Role Based Access Control for the World Wide Web", 20th National Computer Security Conference (1997)Google ScholarGoogle Scholar
  14. Chen, L. and Crampton, J. 2007. Inter-domain role mapping and least privilege. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies (Sophia Antipolis, France, June 20 - 22, 2007). SACMAT'07. ACM, New York, NY, 157--162. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
          June 2008
          214 pages
          ISBN:9781605581293
          DOI:10.1145/1377836

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 June 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate177of597submissions,30%

          Upcoming Conference

          SACMAT 2024

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader