skip to main content
article

Practical safety in flexible access control models

Published:01 May 2001Publication History
Skip Abstract Section

Abstract

Assurance that an access control configuration will not result in the leakage of a right to an unauthorized principal, called safety, is fundamental to ensuring that the most basic of access control policies can be enforced. It has been proven that the safety of an access control configuration cannot be decided for a general access control model, such as Lampson's access matrix, so safety is achieved either through the use of limited access control models or the verification of safety via constraints. Currently, almost all safety critical systems use limited access control models, such as Bell--LaPadula or Domain and Type Enforcement, because constraint expression languages are far too complex for typical administrators to use properly. However, researchers have identified that most constraints belong to one of a few basic types, so our goal is to develop a constraint expression model in which these constraints can be expressed in a straightforward way and extensions can be made to add other constraints, if desired. Our approach to expressing constraints has the following properties: (1) an access control policy is expressed using a graphical model in which the nodes represent sets (e.g., of subjects, objects, etc.) and the edges represent binary relationships on those sets and (2) constraints are expressed using a few, simple set operators on graph nodes. The basic graphical model is very simple, and we extend this model only as necessary to satisfy the identified constraint types. Since the basic graphical model is also general, further extension to support other constraints is possible, but such extensions should be made with caution as each increases the complexity of the model. Our hope is that by keeping the complexity of constraint expression in check, flexible access control models, such as role-based access control, may also be used for expressing access control policy for safety-critical systems.

References

  1. AHN,G.,AND SANDHU, R. 1999. The RSL99 language for role-based separation of duty constraints. In Proceedings of the 4th Workshop on Role-Based Access Control. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. AHN,G.,AND SANDHU, R. 2000. Role-based authorization constraint specification. ACMTrans. Inf. Syst. Sec. 3, 4 (Nov.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. AMMANN,P.E.,AND SANDHU, R. S. 1991. Safety analysis for the extended schematic protection model. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif.Google ScholarGoogle ScholarCross RefCross Ref
  4. AMMANN,P.E.,AND SANDHU, R. S. 1992. The extended Schematic Protection Model. J. Comput. Sec. 1.Google ScholarGoogle ScholarCross RefCross Ref
  5. AMMANN,P.,AND SANDHU, R. 1994. One-representative safety analysis in the non-monotonic transform model. In Proceedings of the 7th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, Calif., pp. 138-149.Google ScholarGoogle ScholarCross RefCross Ref
  6. BELL,D.,AND LA PADULA, L. 1973. Secure computer systems: Mathematical foundations (Volume 1). Tech. Rep. ESD-TR-73-278. Mitre Corporation.Google ScholarGoogle Scholar
  7. BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Sec. (TISSEC) 1, 2 (Feb). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. BERTINO, E., JAJODIA, S., SAMARATI,P.,AND SUBRAHMANIAN, V. S. 1997. Aunified framework for enforcing multiple access control policies. In Proceedings of ACMSIGMOD Conference on Management of Data (May). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. BISHOP, M., AND SNYDER, L. 1979. The transfer of information and authority in a protection system. In Proceedings of the 7th Annual ACM Symposium on Operating System Principles. ACM, New York, pp. 45-54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. BOEBERT,W.E.,AND KAIN, R. Y. 1985. A practical alternative to hierarchical integrity policies. In Proceedings of the 8th National Computer Security Conference (Gaithersburg, Md.).Google ScholarGoogle Scholar
  11. BREWER,D.F.C.,AND NASH, M. J. 1989. The Chinese wall security policy. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., May). IEEE Computer Society Press, Los Alamitos, Calif.Google ScholarGoogle ScholarCross RefCross Ref
  12. CLARK,D.D.,AND WILSON, D. R. 1987. A comparison of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., Apr.). IEEE Computer Society Press, Los Alamitos, Calif.Google ScholarGoogle ScholarCross RefCross Ref
  13. GAL, A., AND ATLURI, V. 2000. An authorization model for temporal data. In Proceedings of the 7th Conference on Computer and Communication Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. GIURI, L., AND IGLIO, P. 1997. Role templates for content-based access control. In Proceedings of the 2nd Workshop on Role-Based Access Control. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. GLIGOR,V.D.,GAVRILA,S.I.,AND FERRAIOLO, D. 1998. On the formal definition of separation-of-duty policies and their composition. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif.Google ScholarGoogle ScholarCross RefCross Ref
  16. HARRISON, M. A., RUZZO,W.L.,AND ULLMAN, J. D. 1976. Protection in operating systems. Commun. ACM 19, 8 (Aug.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. JAEGER, T. 2001. Managing access control complexity using metrics. In Proceedings of 6th ACM Symposium on Access Control Models and Technologies (May). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. JAEGER, T., MICHAILIDIS,T.,AND RADA, R. 1999a. Access control in a virtual university. In Proceedings of 5th IEEE International Workshop on Enterprise Security (WETICE 1999) (June). IEEE Computer Society Press, Los Alamitos, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. JAEGER, T., PRAKASH, A., LIEDTKE,J.,AND ISLAM, N. 1999b. Flexible control of downloaded executable content. ACM Trans. Inf. and Syst. Sec. (TISSEC) 2, 2 (May). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. JAJODIA, S., SAMARATI,P.,AND SUBRAHMANIAN, V. S. 1997. A logical language for expressing authorizations. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. KUHN, D. R. 1997. Mutual exclusion of roles as a means of implementing separation of duty in a role-based access control system. In Proceedings of the 2nd ACM Role-Based Access Control Workshop. ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. LAMPSON, B. W. 1974. Protection. Oper. Syst. Revi., 8, 1 (Jan.), pp. 18-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. LUPU, E., AND SLOMAN, M. 1999. Conflicts in policy-based distributed systems management. IEEE Trans. Softw. Eng. 25, 6 (Nov./ Dec.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. LUNT, T., DENNING, D., SCHELL, R., HECKMAN, M., AND SHOCKLEY, W. 1990. The SeaView security model. IEEE Trans. Softw. Eng., 16, 6 (June). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. LUPU,E.C.,AND SLOMAN, M. 1997. A policy based role object model. In Proceedings of the 1st IEEE Enterprise Distributed Object Computing Workshop (Oct.). IEEE Computer Society Press, Los Alamitos, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. NYANCHAMA, M., AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Trans Inf. Syst. Sec. 2,1 (Feb.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. OSBORN, S. 1997. Mandatory access control and role-based access control revisited. In Proceedings of 2nd ACM Workshop on Role-Based Access Control (Nov.). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. OSBORN,S.,AND GUO, Y. 2000. Modelling users in role-based access control. In Proceedings of the 5th ACM Role-Based Access Control Workshop (July). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. SALTZER,J.,AND SCHROEDER, M. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sept.).Google ScholarGoogle ScholarCross RefCross Ref
  30. SANDHU, R. S. 1988. The schematic protection model: Its definition and analysis for acyclic attenuating schemes. J. ACM 35, 2 (Apr.), 404-432. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. SANDHU, R. S. 1992. The typed access matrix model. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. SANDHU, R. S. 1998. Transaction Control Expressions for Separation of Duties. In Proceeding of the 4th Aerospace Computer Security Applications Conference (Dec.).Google ScholarGoogle Scholar
  33. SANDHU,R.S.,BHAMIDIPATI,V.,AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Sec. 1,2 (Feb.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. SANDHU,R.S.,COYNE,E.J.,FEINSTEIN,H.F.,AND YOUMAN, C. E. 1994. Role-based access control: A multi-dimensional view. In Proceeding of the 10th Annual Computer Security Applications Conference (Dec.).Google ScholarGoogle ScholarCross RefCross Ref
  35. SANDHU,R.S.,COYNE, E., FEINSTEIN,H.L.,AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. SIMON, R., AND ZURKO, M. E. 1997. Mutual exclusion of roles as a means of implementing separation of duty in a role-based access control system. In Proceeding of the 10th IEEE Computer Security Foundations Workshop (June). IEEE Computer Society Press, Los Alamitos, Calif. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. SYNDER, L. 1977. On the synthesis and analysis of protection systems. In Proceedings of the 6th ACM Symposium on Operating System Principles. pp. 141-150. ACM New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. TIDSWELL,J.E.,AND JAEGER, T. 2000a. Integrated constraints and inheritance in DTAC. In Proceedings of the 5th ACM Role-Based Access Control Workshop (July). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. TIDSWELL,J.E.AND JAEGER, T. 2000b. An access control model for simplifying constraint expression. In Proceedings of the 7th ACMConference on Computer and Communication Security (Nov.). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. TIDSWELL, J. E., OUTHRED,G.,AND POTTER, J. 1999. Dynamic rights: Safe extensible access control. In Proceedings of the 4th ACM Role-Based Access Control Workshop (Nov.) ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. TIDSWELL,J.E.,AND POTTER, J. 1998. A dynamically typed access control model. In Proceedings of the Third Australasian Conference on Information Security and Privacy (July). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Practical safety in flexible access control models

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Information and System Security
            ACM Transactions on Information and System Security  Volume 4, Issue 2
            May 2001
            88 pages
            ISSN:1094-9224
            EISSN:1557-7406
            DOI:10.1145/501963
            Issue’s Table of Contents

            Copyright © 2001 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 May 2001
            Published in tissec Volume 4, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • article

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader