783 Hits in 4.5 sec

Towards Formal Verification of Role-Based Access Control Policies

S. Jha, Ninghui Li, M. Tripunitara, Qihua Wang, W. Winsborough
2008 IEEE Transactions on Dependable and Secure Computing  
In this paper, we formalize classes of security analysis problems in the context of Role-Based Access Control. We show that in general, these problems are PSPACE-complete.  ...  Index Terms-Access control, RBAC, formal methods, computational complexity.  ...  In this paper, we focus on policy analysis problems in RBAC, which was invented not for the purpose of safety analysis but for meeting the access control need of realworld applications.  ... 
doi:10.1109/tdsc.2007.70225 fatcat:osup3kqctzdjtm2acjkty37xba

Representing and Reasoning about Web Access Control Policies

Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong Meng
2010 2010 IEEE 34th Annual Computer Software and Applications Conference  
In addition, we propose a policy analysis method that helps identify policy violations in XACML policies accommodating the notion of constraints in role-based access control (RBAC).  ...  , comparison and querying.  ...  All statements of fact, opinion or conclusions contained herein are those of the authors and should not be construed as representing the official views or policies of IARPA, the ODNI or the U.S.  ... 
doi:10.1109/compsac.2010.20 dblp:conf/compsac/AhnHLM10 fatcat:rp2hwjtiurdatk7gg3j4sy2rpu

Access Control Framework for Social Network System using Ontology

Vipin Kumar, Sachin Kumar
2013 International Journal of Computer Applications  
To protect such kind of publically oriented user data need more dynamic access control model.  ...  In recent years, we have seen unprecedented growth in the area of Online Social Networking (OSN) that is still keeping on day by day.  ...  A key advantage of the RBAC model is that it simplifies authorization administration by assigning permissions to users through roles.  ... 
doi:10.5120/13728-1524 fatcat:2wifzeax4nbo5ex2suvnbiffou

LPOP: Challenges and Advances in Logic and Practice of Programming [article]

David S. Warren, Yanhong A. Liu
2020 arXiv   pre-print
The workshop was organized around a challenge problem that specifies issues in role-based access control (RBAC), with many participants proposing combined imperative and declarative solutions expressed  ...  in the languages of their choice.  ...  carrypick Conclusions This position paper presents a software design principle that is a result of the author's study of the differences between declarative and imperative programming for system building  ... 
arXiv:2008.07901v1 fatcat:bahezuktubemhfbabibbw6d75q

Team-and-role-based organizational context and access control for cooperative hypermedia environments

Weigang Wang
1999 Proceedings of the tenth ACM Conference on Hypertext and hypermedia : returning to our diverse roots returning to our diverse roots - HYPERTEXT '99  
Application examples demonstrate that its organizational context management and access permission authorization retain the simplicity of RBAC.  ...  Based on the analysis of these issues, a team-and-role-based access control model is proposed, which describes various aspects of role-based access control in cooperative hypermedia environments.  ...  Problems of applying RBAC to cooperative hypermedia include: . How to integrate RBAC in a team-based virtual organizational context?  ... 
doi:10.1145/294469.294480 dblp:conf/ht/Wang99 fatcat:ygff464l75g6plovhfftucmzce

Towards movement-aware access control

Maria Luisa Damiani, Claudio Silvestri
2008 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS - SPRINGL '08  
In this paper, we first discuss architectural issues related to the development of a multi-domain access control system based on GEO-RBAC.  ...  Following the experience of design of the GEO-RBAC model, in this paper we want to look at those models with a critical eye and point out open conceptual and architectural challenges.  ...  Critical analysis of GEO-RBAC Limitations of the enforcement mechanism Following the traditional access control models, policy enforcement in GEO-RBAC is instantaneous, that is, once the access is authorized  ... 
doi:10.1145/1503402.1503410 dblp:conf/gis/DamianiS08 fatcat:sitb6gihdffivpcz7i23g6z66a

A Contrivance to Encapsulate Virtual Scaffold with Comments and Notes

Nagarajan Balasubramanaian, Suguna Jayapal, Satheeshkumar Janakiraman
2019 ˜The œinternational Arab journal of information technology  
Finally, this paper construed that SuT behaves well for both SQL and NoSQL dataset in terms of time and space complexities.  ...  The SuT supports and accommodates both SQL and Not only Structured Query Language (NoSQL) dataset.  ...  The problem identified were -time taken for execution of query and space requirement for storage of data. Limited authors have discussed solution for query execution.  ... 
doi:10.34028/iajit/17/3/7 fatcat:76ui35rk7rbd5jgwqlnyo5plcq

Analyzing temporal role based access control models

Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna Lisa Ferrara, Madhusudan Parthasarathy
2012 Proceedings of the 17th ACM symposium on Access Control Models and Technologies - SACMAT '12  
In this paper, we consider the temporal extension of RBAC (TRBAC), and develop safety analysis techniques for it.  ...  Several extensions to the authorization as well as the administrative models for RBAC have been adopted in recent years.  ...  In addition, we plan to explore the analysis problem in spatio-temporal RBAC models.  ... 
doi:10.1145/2295136.2295169 dblp:conf/sacmat/UzunASVPFM12 fatcat:ovnl6a4ha5bv7fo5mrozu3edoa

Analyzing and Managing Role-Based Access Control Policies

K. Sohr, M. Drouineaud, G.-J. Ahn, M. Gogolla
2008 IEEE Transactions on Knowledge and Data Engineering  
Although the importance of authorization constraints has been addressed in the literature, there does not exist a systematic way to verify and validate authorization constraints.  ...  We also describe an authorization engine, which supports the enforcement of authorization constraints.  ...  and analysis of RBAC policies is needed.  ... 
doi:10.1109/tkde.2008.28 fatcat:xw6fk4t3xzelvgiyiifgpbge7a

Towards a Pervasive Access Control within Video Surveillance Systems [chapter]

Dana Al Kukhun, Dana Codreanu, Ana-Maria Manzat, Florence Sedes
2013 Lecture Notes in Computer Science  
In this paper, we apply an access control layer on top of the LINDO architecture that takes into consideration the user's context and situation and recommends alternative resources to the user when he  ...  The systems have to adapt, in real time, to the user's context and situation in order to provide him with relevant results without breaking the security and privacy policies.  ...  As the analysis finishes, the Query Analyzer would send the result directly to the user if it's a Permit (step 4a) or back to the Query Interpreter, if it's a deny (step 4b).  ... 
doi:10.1007/978-3-642-40511-2_20 fatcat:6u7wnqjggndyzev6q7i5wom7p4

Towards an Access-Control Metamodel for Web Content Management Systems [chapter]

Salvador Martínez, Joaquin Garcia-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Jordi Cabot
2013 Lecture Notes in Computer Science  
However, little attention has been brought to the analysis of how developers use the content protection mechanisms provided by WCMSs, in particular, Access-control (AC).  ...  To tackle this problem, we propose here a metamodel tailored to the representation of WCMS AC policies, easing the analysis and manipulation tasks by abstracting from vendor-specific details.  ...  Following a RBAC approach, in our metamodel we have two kinds of Subjects: Users and Roles where Users get Roles assigned.  ... 
doi:10.1007/978-3-319-04244-2_14 fatcat:34dj772tbzeqrn2644pjpi4jni

Conceptual View Representation of the Brazilian Information System on Antarctic Environmental Research

R Zorrilla, M Poltosi, L Gadelha, F Porto, A Moura, A Dalto, H P Lavrado, Y Valentin, M Tenório, E Xavier
2014 Data Science Journal  
In this work, we describe BrAntIS, the Brazilian Information System on Antarctic Environmental Research, which enables the acquiring, storing, and querying of research data generated by the Brazilian National  ...  BrAntIS' data model reflects data acquisition and analysis conducted by scientists and organized around field expeditions.  ...  Such restrictions are achieved in the system by using role-based access control (RBAC; Ferraiolo & Kuhn, 1992) to limit certain services to authorized users only.  ... 
doi:10.2481/dsj.ifpda-04 fatcat:oid7lfgl75br3mh3etdgttbobi

Towards formal security analysis of GTRBAC using timed automata

Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
2009 Proceedings of the 14th ACM symposium on Access control models and technologies - SACMAT '09  
Such an analysis calls for formal verification. While formal analysis on traditional RBAC has been done to some extent, the extensions of RBAC lack such an analysis.  ...  RBAC components like role, user and permission.  ...  They proposed two reduction algorithms and studied complexity results for various analysis problems such as safety, availability and containment. Stoller et al.  ... 
doi:10.1145/1542207.1542214 dblp:conf/sacmat/MondalSA09 fatcat:yst7sskmhjckrhie6dnuoxzhqe

Constructing Authorization Systems Using Assurance Management Framework

Hongxin Hu, Gail-Joon Ahn
2010 IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews)  
We also articulate our experience in analyzing role-based authorization requirements and realizing those requirements in constructing a role-based authorization system.  ...  In this paper, we introduce a multilayered software development life cycle (SDLC), which is based on an assurance management framework (AMF), focusing on the development of authorization systems.  ...  Instead, each query returns a value or a set of attributes of corresponding RBAC element set or relation. In OCL, they are defined as a body expression.  ... 
doi:10.1109/tsmcc.2010.2047856 fatcat:is4bc7uldjbnnmqvsqwnmhwjoy

Security analysis for temporal role based access control

Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Anna Lisa Ferrara, Gennaro Parlato, P. Madhusudan
2014 Journal of Computer Security  
In this paper, we consider security analysis for the Temporal RBAC (TR-BAC), one of the extensions of RBAC.  ...  Then we propose our security analysis strategy, that essentially decomposes the temporal security analysis problem into smaller and more manageable RBAC security analysis sub-problems for which the existing  ...  Given an initial authorization state and a set of security policies specified by authorization rules, a security analysis is a query the administrator makes on the set of reachable authorization states  ... 
doi:10.3233/jcs-140510 fatcat:lymvppu2grbodjreyzikwx2vlu
« Previous Showing results 1 — 15 out of 783 results