Specifying and enforcing the principle of least privilege in role-based access control

نویسندگان

  • Xiaopu Ma
  • Ruixuan Li
  • Zhengding Lu
  • Jianfeng Lu
  • Meng Dong
چکیده

The principle of least privilege in role-based access control (RBAC) is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of least privilege and present different variations, called the δ-approx principle of least privilege and the minimizing-approx principle of least privilege. Since there may be more than one result to enforce the same principle of least privilege, we introduce the notation about weights of permission and role to optimize the results. Then we prove that all least privilege problems are NP-complete. As an important contribution of the paper, we show the principle of least privilege problem can be reduced to minimal cost set covering (MCSC) problem. We can borrow the existing solutions of MCSC to solve the principle of least privilege problems. Finally, different algorithms are designed to solve the proposed least privilege problems. Experiments on performance study prove the superiority of our algorithms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role-based Security

User role-based protection presents a exible (hence adaptive) means for enforcing diering ranges of security policies. It can emulate both mandatory and discretionary access control modes of protection. Role-based protection enforces the principle of least privilege, hence minimizing the risk of Trojan horse attacks. This paper oers a glimpse into the strengths (and some weaknesses) of role-bas...

متن کامل

SmartAccess: An Intelligent Proactive Role-Based Authorization System

In role-based access control (RBAC), users and objects are assigned to one or more roles. Users should be active in the role that has the required permissions before making access requests. In other words, users should be aware of the role-permission assignments i.e., what roles are required to perform operations on objects, so that they can activate the required roles. Thus, with the increase ...

متن کامل

Enforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

متن کامل

Working Sets for the Principle of Least Privilege in Role Based Access Control (RBAC) and Desktop Operating Systems

The central topic of this thesis is the the access control principle of least privilege, which states that every user and every program should run with the least privileges necessary required to complete an intended task. Adherence of users and programs to this principle can protect a system from serious damage in case of attacks. However, as will be shown, it is in practice very hard to follow...

متن کامل

PULSE: a Pluggable User-space Linux Security Environment paper

The discretionary access controls (DAC) employed by traditional operating systems only provide system administrators and users with a loose ability to specify the security policies of the system. In contrast, mandatory access controls (MAC) provide a stronger, finer-grained mechanism for specifying and enforcing system security policies. A related security concept called the principle of least ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Concurrency and Computation: Practice and Experience

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2011