A Framework for Secure, Obligated, Coordinated and Dynamic Collaboration that Extends NIST RBAC

نویسندگان

  • Solomon Berhe
  • Steven A. Demurjian
  • Thomas Agresta
چکیده

There has been a long history of security and access control models, from both a research perspective, and as realized in working systems. The three dominant models are: mandatory access control, MAC [Bell, 1975], discretionary access control, DAC [Linn, 1999], and role-based access control, RBAC [Sandhu, 1996]. In MAC [Bell, 1975], security levels (SL’s) such as unclassified (U), confidential (C), secret (S), and top secret (T) where U < C < S < T form a lattice structure and are assigned to each subject (clearance CLR) and object (classification CLS). The permission of the subject to perform some operation on the object depends on the CLR and CLS relation as dictated by: Simple Security Property (read down no read up) [Bell, 1975]; Simple Integrity Property (write down no write up) [Biba, 1977]; and, Liberal *-Property (write up no write down') [Bell, 1975]. Role-based Access Control (RBAC) as supported by the National Institute of Stands and Technology (NIST RBAC, 2010) provides for the definition of roles, the binding of roles to permissions, the assignment of roles to users, and the association of users to objects limited by the permissions on the assigned user’s role, where the constraints in RBAC focus on providing the ability to limit access via separation of duty and cardinality constraints [Ahn, 2000; Han, 2007], and support least privilege, which allows for access to only that information which is necessary to accomplish one's tasks [Ferraiolo, 2001]. In DAC, the emphasis is on the delegation of authority, where an authorized individual (not the security officer) may delegate all or part of his/her authority to another individual, increasing security risk, and raising interesting security assurance implications [Linn, 1999]. These approaches share an overriding emphasis to protect and limit access, controlling who and when actions against data can occur.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure, obligated and coordinated collaboration in health care for the patient-centered medical home.

In the patient-centered medical home, PCMH, patient care is overseen by a primary care physician leading a team of health care providers, who collaborate to optimize treatment. To facilitate interactions in PCMH, secure collaboration will be needed to: control access to information; dictate who can do what when; and promote sharing and concurrent access. This contrasts approaches such as the Na...

متن کامل

Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC

To facilitate collaboration in the patient-centered medical home (PCMH), our prior work extended the NIST role-based access control (RBAC) model to yield a formal collaboration on duty and adaptive workflow (COD/AWF) model. The next logical step is to place this work into the context of an integrated software process for security engineering from design through enforcement. Towards this goal, w...

متن کامل

RABAC: Role-Centric Attribute-Based Access Control

Role-based access control (RBAC) is a commercially dominant model, standardized by the National Institute of Standards and Technology (NIST). Although RBAC provides compelling benefits for security management it has several known deficiencies such as role explosion, wherein multiple closely related roles are required (e.g., attendingdoctor role is separately defined for each patient). Numerous ...

متن کامل

A New Framework for Secure Routing in VANET

Vehicular Ad-Hoc Networks can enhance road safety and enable drivers to avoid different threats. Safety applications, mobile commerce, and other information services are among different available services that are affected by dynamic topology, vehicle’s speed and node misbehaving. Dynamic topology makes the route unstable and unreliable. So, improving the throughput and performance of VANET thr...

متن کامل

Towards secure dynamic collaborations with group-based RBAC model

Role-Based Access Control (RBAC) has become a popular technique for security purposes with increasing accessibility of information and data, especially in large-scale enterprise environments. However, authorization management in dynamic and ad-hoc collaborations between different groups or domains in these environments is still an unresolved problem. Traditional RBAC models cannot solve this pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014