The ASCAA Principles for Next-Generation Role-Based Access Control
نویسندگان
چکیده
Role-based access control (RBAC) received serious academic attention in the early 1990’s, although traces of the underlying concepts had been in ad hoc commercial practise since the 1970’s. Through the 1990’s and 2000’s RBAC achieved remarkable success, and today is widely practised as the preferred form of access control. Adoption of the 2004 NIST/ANSI Standard RBAC Model [1] marks a maturity of concept and practice. The essential roots of this standard go back to the RBAC96 model [2]. While numerous enhancements and extensions of RBAC96 and related models have been proposed, the core ideas introduced in RBAC96 have proved to be notably stable and robust. RBAC96 was based on four principles, viz. abstract privileges, separation of administrative functions, least privilege and separation of duties. Advances in RBAC require reconsideration of its founding principles. In this paper we offer five founding principles for next-generation access control including next-generation RBAC, summarized as ASCAA for Abstraction, Separation, Containment, Automation and Accountability. Abstraction (i.e., abstract privileges) and separation (i.e., separation of administrative functions) are essentially retained from RBAC96. A generalized principle called containment is introduced, to subsume least privilege, separation of duties and other constraints, as well as modern techniques such as usage and rate limits [3], [4]. Next two new principles called automation and accountability are introduced. Automation covers automated acquisition of privileges as well as automated revocation. Traditional RBAC typically requires that user-role and permission-role assignment and revocation result from explicit actions of appropriately authorized administrators. Some aspects of automated user-role assignment [5], [6], [7] and user-role revocation [8] have been previously proposed. We elevate the notion of automation to a full-blown principle and specifically propose self-assignment of roles as a new element. Automating assignment and revocation enables agile lightweight systems by eliminating repeated human intervention. Crucially, of course, we want to do this without compromising security. Accountability has recently received considerable attention driven by emerging requirements of secure information sharing and continued recognition of the insider threat. We offer the paradigm of adjustment as a means to achieve accountability. Adjustment acknowledges that not all authorized actions are the same. Sensitive operations require an enhanced level of auditing, notification or authentication. For example, it is common place for websites to require additional authentication and notification for sensitive operations such as change of address. While we believe these five ASCAA principles (Abstraction, Separation, Containment, Automation and Accountability) are relevant to access control systems in general, the discussion in this paper is limited to their application to RBAC.
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملHybrid Quality of Service Architecture for Wireless/Mobile Environment
Provision of Quality of Service (QoS) guarantees for multimedia applications over IP networks is rapidly becoming a critical research and design issue, especially within the radio access segment of the next generation wireless/mobile environment. While the simple and scalable Differentiated Services (DiffServ) QoS control model is suitable for the core part of the network, more explicit, admiss...
متن کاملبهبود کارایی پروتکلSIP در شرایط اضافه بار با استفاده از قابلیت مبتنی بر پنجره
The extent and diversity of systems provided by IP networks have made various technologies to approach integrating various types of access networks and converting to next generation network. The Session Initiation Protocol (SIP) with respect to facilities such as being in text form, end-to-end connection, independence from the type of transmitted data, and supporting various forms of transmissi...
متن کاملSecuring Event-Based Systems
This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter de...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008