skip to main content
10.1145/373256.373259acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

Flexible team-based access control using contexts

Published:01 May 2001Publication History

ABSTRACT

We discuss the integration of contextual information with team-based access control. The TMAC model was formulated by Thomas in [1] to provide access control for collaborative activity best accomplished by teams of users. In TMAC, access control revolves around teams, where a "team" is an abstraction that encapsulates a collection of users in specific roles and collaborating with the objective of accomplishing a specific task or goal. Users who belong to a team are given access to resources used by a team. However, the effective permissions of a user are always derived from permission types defined for roles that the user belongs to. TMAC is an example of what we call "active security models". These models are aware of the context associated with an ongoing activity in providing access control and thus distinguish the passive concept of permission assignment from the active concept of context-based permission activation. The ability to integrate contextual information allows models such as TMAC to be flexible and express a variety of access policies that can provide tight and just-in-time permission activation.

References

  1. 1.Thomas R.K. Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments, Proceedings of the Second ACM workshop on Role-based Access Control, Fairfax, VA USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.NIST. Role Based Access Control, National Institute of Standards and Technology, 1999, available in URL: http://hissa.ncsl.nist.gov/rbacGoogle ScholarGoogle Scholar
  3. 3.NIST. An Introduction to Role-based Access Control, NIST CSL Bulletin on RBAC, National Institute of Standards and Technology, 1995, available in URL: http://csrc.nist.gov/nistbul/csl95-12.txtGoogle ScholarGoogle Scholar
  4. 4.Sandhu R. Role-Based Access Control, Advances in Computers, Vol.46, Academic Press, 1998.Google ScholarGoogle Scholar
  5. 5.ISO. ISO / IEC 10181-3 Model of Access Control, X/ Open Guide Basic Security Facilities - Authorization in Distributed Security Framework, 1994.Google ScholarGoogle Scholar
  6. 6.Beznosov K. Requirements for Access Control: US Healthcare domain, Proceedings of the Third ACM Workshop on Role-Based Access Control, October 1998, Fairfax, VA, USA, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Lupu E. and Sloman M. Reconciling Role Based Management and Role-based Access Control, Proceedings of the Second ACM Workshop on RBAC, Fairfax, VA, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Giuri L. and Iglio P. Role Templates for Content-Based Access Control, Proceedings of the Second ACM Workshop on RBAC, Fairfax, VA, USA, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Farrel S. and Housley R. An Internet Attribute Certificate Profile for Authorization, Internet Draft: draft.ietf.pkix.ac509prof-03.txt, work in progress, May 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.Mavridis I., Georgiadis C., Pangalos G. and Khair M. Using Digital Certificates for Access Control in Clinical Intranet Applications. Journal Technology and Health Care, Vol. 8, Nos. 3, 4 (2000), ISSN 0928-7329, p. 173-174, IOS Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.Pernul G. Database Security, Advances in Computers, Vol.38, M.C. Yovits (Ed.), Academic Press, 1994.Google ScholarGoogle Scholar
  12. 12.Pangalos G. and Khair M. Design of a Secure Medical Database Systems, in IFIP/SEC'96, 12th international information security conference, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Mavridis I., Pangalos G. and Khair M. eMEDAC: Rolebased Access Control Supporting Discretionary and Mandatory Features, Proceedings of 13th IFIP WG 11.3 Working Conference on Database Security, Seattle, Washington, USA, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Flexible team-based access control using contexts

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies
            May 2001
            181 pages
            ISBN:1581133502
            DOI:10.1145/373256

            Copyright © 2001 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 May 2001

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%

            Upcoming Conference

            SACMAT 2024

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader