期刊文献+

A formal model for access control with supporting spatial context 被引量:7

A formal model for access control with supporting spatial context
原文传递
导出
摘要 There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented, and the role is assigned a logical location domain to specify the spatial boundary. Roles are activated based on the current physical position of the user which obtsined from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, con- strained SC-RBAC allows express various spatial separations of duty constraints, location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 in- variants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control. There is an emerging recognition of the importance of utilizing contextual information in authorization decisions. Controlling access to resources in the field of wireless and mobile networking require the definition of a formal model for access control with supporting spatial context. However, traditional RBAC model does not specify these spatial requirements. In this paper, we extend the existing RBAC model and propose the SC-RBAC model that utilizes spatial and location-based information in security policy definitions. The concept of spatial role is presented, and the role is assigned a logical location domain to specify the spatial boundary. Roles are activated based on the current physical position of the user which obtsined from a specific mobile terminal. We then extend SC-RBAC to deal with hierarchies, modeling permission, user and activation inheritance, and prove that the hierarchical spatial roles are capable of constructing a lattice which is a means for articulate multi-level security policy and more suitable to control the information flow security for safety-critical location-aware information systems. Next, con- strained SC-RBAC allows express various spatial separations of duty constraints, location-based cardinality and temporal constraints for specify fine-grained spatial semantics that are typical in location-aware systems. Finally, we introduce 9 in- variants for the constrained SC-RBAC and its basic security theorem is proven. The constrained SC-RBAC provides the foundation for applications in need of the constrained spatial context aware access control.
出处 《Science in China(Series F)》 2007年第3期419-439,共21页 中国科学(F辑英文版)
关键词 information security RBAC spatial context LATTICE MLS CONSTRAINTS formal model information security, RBAC, spatial context, lattice, MLS, constraints, formal model
  • 相关文献

参考文献30

  • 1[1]Sandhu R,Coyne E,Feinstein H,et al.Role base access control models.IEEE Comp,1996,29(2):38-47
  • 2[2]Ferraolo D,Sandhu R,Gavrila S,et al.Proposed NIST standard for role-based access control.ACM Trans Inf Syst Sec,2001,4(3):224-274
  • 3[3]Covington M,Long W,Srinivasan S,et al.Securing context-aware applications using environment roles.In:Proceedings of the 6th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2001.10-20
  • 4[4]Cuppens F,Miège A.Modelling contexts in the Or-BAC model.In:Proceedings of the 19th Annual Computer Security Applications Conference.Washington:IEEE Computer Society Press,2003.416-427
  • 5[5]Wilikens M,Feriti S,Sanna A,et al.A context-related authorization and access control method based on RBAC:A case study from the health care domain.In:Proceedings of the 7th ACM Symposium on Access Control Models and Technologies.New York:ACM Press,2002.117-124
  • 6[6]Georgiadis C,Mavridis I,Pangalos G,et al.Flexible team-based access control using contexts.In:Proceedings of 6th ACM symposium on Access Control Models and Technologies.New York:ACM Press,2001.21 -27
  • 7[7]Thomas R.Team-based access control (TMAC):A primitive for applying role-based access controls in collaborative environments.In:Proceedings of 2nd ACM Workshop on Role-based Access Control.New York:ACM Press,1997.13-19
  • 8[8]Wolf R,Keinz T,Schenider M.A model for context-dependent access control for web-based services with role-based approach.In:Proceedings of 14th International Workshop on Database and Expert Systems Applications.Washington:IEEE Computer Society Press,2003.209-214
  • 9[9]Kumar A,Karnik N,Chafle G.Context sensitivity in role-based access control.ACM SIGPOS Op Syst Rev,2002,36(3):53-66
  • 10[10]Covington M,Moyer M,Ahamad M.Generalized role-based access control for securing future applications.In:Proceedings of 23rd National Information Systems Security Conference.Washington:IEEE Computer Society,2003.416-427

同被引文献39

  • 1王俊,贾连兴,姚海潮,何建平.基于RBAC的文件级分布式安全访问控制系统的研究[J].计算机研究与发展,2011,48(S1):24-29. 被引量:2
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3张向英.《传播净化法案》:美国对色情网站的控制模式[J].社会科学,2006(8):136-143. 被引量:10
  • 4林闯,封富君,李俊山.新型网络环境下的访问控制技术[J].软件学报,2007,18(4):955-966. 被引量:67
  • 5Sweeney L.Datafly:A system for providing anonymity in medical data. Database SecurtyⅪ: Status and Prospects,IFIP TC11 WG11.3 Eleventh International Conference on Database Security(DBSec),IFIP Conference Proceedings . 1997
  • 6Meyerson A,Williams R.On the complexity of optimal k-anonymity. Proceedings of the Twenty-third ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems(PODS) . 2004
  • 7Atallah M,Bertino E,Elmagarmid A,et al.Disclosure limitation of sensitive rules. Proceedings of 1999 IEEE Knowledge and Data Engineering Exchange Workshop(KDEX‘99) . 1999
  • 8Brodskyand A,Farkas C,Jajodia S.Secure databases:Constraints,inference channels,and monitoring disclosures. IEEE Trans Knowl Data En . 2000
  • 9Hochbaum D S.Approximation Algorithms for NP-Hard Problems. . 1997
  • 10Sweeney L.K-anonymity: a model for protecting privacy. International Journal on Uncertainty,Fuzziness and Knowledge-Based Systems . 2002

引证文献7

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部