skip to main content
10.1145/948109.948123acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

On permissions, inheritance and role hierarchies

Published:27 October 2003Publication History

ABSTRACT

Role-based access control and role hierarchies have generated considerable research activity in recent years.In many role-based models the role hierarchy partially determines which roles and permissions are available to users via various inheritance mechanisms.In this paper, we consider the nature of permissions more closely than is customary in the literature and propose a particular structure for permissions.We then introduce a role-based access control model that contains a novel approach to permission inheritance and illustrate how this model can be used to derive a role-based model with multi-level secure properties.We also consider the issue of redundant and consistent permission-role assignments and describe how such assignments can be avoided.

References

  1. Bell, D., and LaPadula, L. Secure computer systems: Unified exposition and Multics interpretation. Tech. Rep. MTR-2997, Mitre Corporation, Bedford, Massachusetts, 1976.Google ScholarGoogle ScholarCross RefCross Ref
  2. Crampton, J., and Loizou, G. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security 6, 2 (2003). 201--231. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Davey, B., and Priestley, H. Introduction to Lattices and Order. Cambridge University Press, Cambridge, United Kingdom, 1990.Google ScholarGoogle Scholar
  4. Denning, D. A lattice model of secure information flow. Communications of the ACM 19, 5 (1976), 236--243. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., and Chandramouli, R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4, 3 (2001), 224--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gavrila, S., and Barkley, J. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1998), pp. 81--90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Goh, C., and Baldwin, A. Towards a more complete model of role. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1998), pp. 55--61. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kuhn, D. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of Second ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1997), pp. 23--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Kuhn, D. Role based access control on MLS systems without kernel changes. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1998), pp. 25--35. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. McLean, J. Security models. In Encyclopedia of Software Engineering, J. Marciniak, Ed. John Wiley & Sons, 1994.Google ScholarGoogle Scholar
  11. Moffett, J., and Lupu, E. The uses of role hierarchies in access control. In Proceedings of Fourth ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1999), pp. 153--160. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Nyanchama, M., and Osborn, S. The role graph model and conflict of interest. ACM Transactions on Information and System Security 2, 1 (1999), 3--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Osborn, S., Sandhu, R., and Munawer, Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 2 (2000), 85--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Sandhu, R. Role hierarchies and constraints for lattice-based access controls. In Proceedings of Fourth European Symposium on Research in Computer Security (Rome, 1996), pp. 65--79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Sandhu, R., Bhamidipati, V., and Munawer, Q. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 1, 2 (1999), 105--135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. Role-based access control models. IEEE Computer 29, 2 (1996), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On permissions, inheritance and role hierarchies

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
            October 2003
            374 pages
            ISBN:1581137389
            DOI:10.1145/948109

            Copyright © 2003 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 27 October 2003

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate1,261of6,999submissions,18%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader