[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/507711.507737acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

A model for role administration using organization structure

Published: 03 June 2002 Publication History

Abstract

Role-based access control (RBAC) is recognized as an excellent model for access control in an enterprise environment. In large enterprises, effective RBAC administration is a major issue. ARBAC97 is a well-known solution for decentralized RBAC administration. ARBAC97 authorizes administrative roles by means of role ranges' and prerequisite conditions'. Although attractive and elegant in their own right, we will see that these mechanisms have significant shortcomings.We propose an improved role administration model named ARBAC02 to overcome the weaknesses of ARBAC97. ARBAC02 adopts the organization unit for new user and permission pools independent of role or role hierarchy. It uses a refined prerequisite condition. In addition, we present a bottom-up approach to permission-role administration in contrast to the top-down approach of ARBAC97.

References

[1]
Ravi Sandhu and Venkata Bhamidipati, "The URA97 model for role-based user-role assignment", In Proceedings of IFIP WG 11.3 Workshop on Database Security, August 1997.
[2]
Ravi Sandhu and Venkata Bhamidipati, "The ARBAC97 model for Role-based administration of Roles: Preliminary Description and Outline", In Proceedings of second ACM Workshop on Role-Based Access Control. November 1997.
[3]
Ravi Sandhu and Venkata Bhamidipati, "Role-based administration of user-role assignment: The URA97 model and its Oracle implementation", The Journal of Computer Security, Vol.7, 1999.
[4]
Ravi Sandhu and Qamar Munawer, "The ARBAC99 model for administration of roles", In Proceedings of the Annual Computer Security Applications Conference. 1999.
[5]
Najam Perwaiz and Ian Sommerville, "Structured management of role-permission relationships", In Proceedings of 6th ACM Symposium on Access Control Models and Technologies (SACMAT2001), May 2001.
[6]
James B.D. Joshi, Walid G. Aref, Arif Ghafoor, and Eugene H. Spafford, "Security models for web-based applications", Communications of the ACM, Vol. 44, No.2, February 2001.
[7]
Ravi Sandhu, Edward Coyne, Hal Feinstein and Charles Youman, "Role-Based Access Control Models." IEEE Computer, Volume 29, Number 2, February 1996, pages 38--47.
[8]
Jonathan D. Moffett, "Control Principles and Role Hierarchies", In Proceedings of the 3rd ACM Workshop on Role-Based Access Control. October 1998.
[9]
Jonathan D. Moffett and Emil C. Lupu, "The use of role hierarchies in access control", In Proceedings of the 4th ACM Workshop on Role-Based Access Control. October 1999.
[10]
Sylvia Osborn, Ravi Sandhu and Qamar Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies", ACM Transactions on Information and System Security, Volume 3, Number 2, May 2000, pages 85--106.
[11]
Ravi Sandhu, Venkata Bhamidipati and Qamar Munawer, "The ARBAC97 Model for Role-Based Administration of Roles", ACM Transactions on Information and System Security, Volume 2, Number 1, February 1999, pages 105--135.
[12]
Matunda Nyanchama and Sylvia Osborn, "The Role Graph Model and Conflict of Interest", ACM Transactions on Information and System Security, Vol. 2, No. 1, February 1999, pages 3--33.

Cited By

View all
  • (2022)Collaborative Administration of Role-Based Access Control in Smart Contracts2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)10.1109/BRAINS55737.2022.9909116(87-94)Online publication date: 27-Sep-2022
  • (2021)Role-Based Administration of Role-Based Smart Home IoTProceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems10.1145/3445969.3450426(49-58)Online publication date: 28-Apr-2021
  • (2021)Role ConceptsE‐CARGO and Role‐Based Collaboration10.1002/9781119693123.ch2(35-67)Online publication date: 19-Nov-2021
  • Show More Cited By

Index Terms

  1. A model for role administration using organization structure

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
      June 2002
      170 pages
      ISBN:1581134967
      DOI:10.1145/507711
      • General Chair:
      • Ravi Sandhu,
      • Program Chair:
      • Elisa Bertino
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 03 June 2002

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. RBAC
      2. access control
      3. role administration

      Qualifiers

      • Article

      Conference

      SACMAT02
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 177 of 597 submissions, 30%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)48
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 14 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Collaborative Administration of Role-Based Access Control in Smart Contracts2022 4th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)10.1109/BRAINS55737.2022.9909116(87-94)Online publication date: 27-Sep-2022
      • (2021)Role-Based Administration of Role-Based Smart Home IoTProceedings of the 2021 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems10.1145/3445969.3450426(49-58)Online publication date: 28-Apr-2021
      • (2021)Role ConceptsE‐CARGO and Role‐Based Collaboration10.1002/9781119693123.ch2(35-67)Online publication date: 19-Nov-2021
      • (2020)A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions2020 Second IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA)10.1109/TPS-ISA50397.2020.00032(169-178)Online publication date: Oct-2020
      • (2020)Role-Based Access Control Constraints and Object Constraint LanguageAccess Control Management in Cloud Environments10.1007/978-3-030-31729-4_7(141-158)Online publication date: 30-Sep-2020
      • (2020)Using RBAC to Secure Payment Process in CloudAccess Control Management in Cloud Environments10.1007/978-3-030-31729-4_6(117-138)Online publication date: 30-Sep-2020
      • (2019)On model-based analysis of organizational structures: an assessment of current modeling approaches and application of multi-level modeling in support of design and analysis of organizational structuresSoftware and Systems Modeling10.1007/s10270-019-00767-4Online publication date: 28-Nov-2019
      • (2018)ORGODEX: Authorization as a service (AaaS)2018 Annual IEEE International Systems Conference (SysCon)10.1109/SYSCON.2018.8369532(1-8)Online publication date: Apr-2018
      • (2018)Administration Model for RBACEncyclopedia of Database Systems10.1007/978-1-4614-8265-9_1507(68-69)Online publication date: 7-Dec-2018
      • (2017)AARBAC: Attribute-Based Administration of Role-Based Access Control2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)10.1109/CIC.2017.00027(126-135)Online publication date: Oct-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media