skip to main content
10.1145/990036.990049acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

X-GTRBAC admin: a decentralized administration model for enterprise wide access control

Published:02 June 2004Publication History

ABSTRACT

Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large user and resource pools, administering the access control based on any framework could in itself be a daunting task. This work presents X-GTRBAC Admin, an administration model that aims at enabling policy administration within a large enterprise. In particular, it simplifies the process of user-to-role and permission-to-role assignments, and thus allows decentralization of the policy administration tasks. Secondly, it also allows for specifying the domain of authority of the system administrators, and hence provides mechanism to distribute the administrative authority over multiple domains within the enterprise. The paper also illustrates the applicability of the administrative concepts presented in our framework for enterprise-wide access control.

References

  1. Overview of Enterprise Computing http://faculty.washington.edu/jtenenbg/courses/455/s02/sessions/ec_overview.pptGoogle ScholarGoogle Scholar
  2. XACML 1.0 Specification http://xml.coverpages.org/ni2003-02-11-a.htmlGoogle ScholarGoogle Scholar
  3. R. Bhatti, "X-GTRBAC: An XML-based Policy Specification Framework and Architecture for Enterprise-Wide Access Control", Masters thesis, Purdue University, May 2003. Available as CERIAS tech. report 2003-27.Google ScholarGoogle Scholar
  4. J. B. D. Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor, "Generalized Temporal Role Based Access Control Model (GTRBAC)", Submitted to IEEE Transaction on Knowledge and Data Engineering. Available as CERIAS tech. report 2001-47.Google ScholarGoogle Scholar
  5. R. Sandhu and Q. Munawer. The ARBAC99 model for administration of roles. In Proceedings of the 15th Annual Computer Security Applications Conference, Dec 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli, "Proposed NIST standard for role-based access control", ACM Transactions on Information and System Security (TISSEC), Volume 4 , Issue 3 (August 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, "Role Based Access Control Models", IEEE Computer Vol. 29, No 2, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. L. Osborn, R. Sandhu, Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security, Vol. 3, No. 2, February 2000, pp. 85--106. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. B. D. Joshi, Elisa Bertino, Arif Ghafoor, "Temporal hierarchies and inheritance semantics for GTRBAC", In proceedings of 7th ACM Symposium on Access Control Models and Technologies, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Bacon, K. Moody, W. Yao, "A model of OASIS role-based access control and its support for active security", ACM Transactions on Information and System Security (TISSEC) Volume 5 , Issue 4 , November 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. A. Al-Kahtani, R. Sandhu, "A Model for Attribute-Based User-Role Assignment", In proceedings of 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Oh, R. Sandhu, "A model for role administration using organization structure", In proceedings of the seventh ACM symposium on Access control models and technologies, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Kern, A. Schaad, J. Moffett, "An administration concept for the enterprise role-based access control model", In proceedings of 8th ACM Symposium on Access Control Models and Technologies, June 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. X-GTRBAC admin: a decentralized administration model for enterprise wide access control

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies
            June 2004
            182 pages
            ISBN:1581138725
            DOI:10.1145/990036

            Copyright © 2004 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 June 2004

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%

            Upcoming Conference

            SACMAT 2024

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader