Back to Search Start Over

Authorization Constraints Specification of RBAC.

Authors :
Hutchison, David
Kanade, Takeo
Kittler, Josef
Kleinberg, Jon M.
Mattern, Friedemann
Mitchell, John C.
Naor, Moni
Nierstrasz, Oscar
Pandu Rangan, C.
Steffen, Bernhard
Sudan, Madhu
Terzopoulos, Demetri
Tygar, Doug
Vardi, Moshe Y.
Weikum, Gerhard
Sehun Kim
Yung, Moti
Hyung-Woo Lee
Lilong Han
Qingtan Liu
Source :
Information Security Applications (978-3-540-77534-8); 2008, p266-276, 11p
Publication Year :
2008

Abstract

Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principle motivations behind RBAC. Although the importance of the constraints in RBAC has been recognized for a long time, they have not received much attention. In this article, we introduce an intuitive formal language for specifying role-based authorization constraints named RCL2000 including its basic elements, syntax and semantics. We show how previously identified role-based authorization constraints such as separation of duty (SOD) can be expressed in this language, and that there are other significant SOD properties that have not been previously identified in the literature. Our work indicates that there are many alternate formulations of even the simplest SOD properties, with varying degree of flexibility and assurance. So this language provides us a rigorous foundation for systematic study of role-based authorization constraints. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISBNs :
9783540775348
Database :
Complementary Index
Journal :
Information Security Applications (978-3-540-77534-8)
Publication Type :
Book
Accession number :
34229131
Full Text :
https://doi.org/10.1007/978-3-540-77535-5_19