skip to main content
10.1145/1063979.1063991acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

A fine-grained, controllable, user-to-user delegation method in RBAC

Published:01 June 2005Publication History

ABSTRACT

This paper addresses the issues surrounding user-to-user delegation in RBAC. We show how delegations can be incorporated into the RBAC model in a simple and straightforward manner. A special feature of the model is that it allows fine-grained control over what rights a user wishes to delegate as opposed to delegation at the role level where all the rights of a role must be delegated. In addition, the model provides a rich set of controls regarding further delegations of a right, generic constraints that further control delegations, and an innovative model for revocations. Properties of both delegation and revocation are discussed, and our work is compared with other related research.

References

  1. Vijayalakshmi Atluri and Avigdor Gal. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur., 5(1):62--94, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Jean Bacon, Ken Moody, and Walt Yao. A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur., 5(4):492--540, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ezedin S. Barka and Ravi Sandhu. Framework for role-based delegation models. In 16th Annual Computer Security Applications Conference, December 2000. http://www.acsac.org/2000/abstracts/34.html. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Ezedin S. Barka and Ravi Sandhu. A role-based delegation model and some extensions. In 23rd National Information Systems Security Conference, October 2000. http://csrc.nist.gov/nissc/2000/proceedings/papers/021.pdf.Google ScholarGoogle Scholar
  5. Evgeny Dantsin, Thomas Eiter, Georg Gottlob, and Andrei Voronkov. Complexity and expressive power of logic programming. ACM Comput. Surv., 33(3):374--425, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ronald Fagin. On an authorization mechanism. ACM Trans. Database Syst., 3(3):310--319, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Cheh Goh and Adrian Baldwin. Towards a more complete model of role. In RBAC '98: Proceedings of the third ACM workshop on Role-based access control, pages 55--62. ACM Press, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Patricia P. Griffiths and Bradford W. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems (TODS), 1(3):242--255, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Asa Hagstrom, Sushil Jajodia, Francesco Parisi-Presicce, and Duminda Wijesekera. Revocations - a classification. In CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations, page 44. IEEE Computer Society, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. JongSoon Park, YoungLok Lee, HyungHyo Lee, and BongNam Noh. A role-based delegation model using role hierarchy supporting restricted permission inheritance. In Proceedings of the International Conference on Security and Management, SAM '03, pages 294--302. CSREA Press, 2003.Google ScholarGoogle Scholar
  11. Chun Ruan and Vijay Varadharajan. Resolving conflicts in authorization delegations. In 7th Australian Conference on Information Security and Privacy, volume 2384 of Lecture Notes in Computer Science, pages 271--285. Springer, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38--47, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ravi Sandhu and Qamar Munawer. The ARBAC99 model for administration of roles. In Annual Computer Security Applications Conference, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Roberto Tamassia, Danfeng Yao, and William H. Winsborough. Role-based cascaded delegation. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, pages 146--155. ACM, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jacques Wainer, Paulo Barthelmess, and Akhil Kumar. WRBAC - a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems, 12(4):455--486, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  16. Walt Yao. Fidelis: A policy-driven trust management framework. In Trust Management, First International Conference, iTrust, volume 2692 of Lecture Notes in Computer Science, pages 301--317. Springer, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Longhua Zhang, Gail-Joon Ahn, and Bei-Tseng Chu. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur., 6(3):404--441, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Xinwen Zhang, Sejong Oh, and Ravi Sandhu. PBDM: a flexible delegation model in RBAC. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 149--157. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A fine-grained, controllable, user-to-user delegation method in RBAC

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
        June 2005
        186 pages
        ISBN:1595930450
        DOI:10.1145/1063979
        • General Chair:
        • Elena Ferrari,
        • Program Chair:
        • Gail-Joon Ahn

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 June 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate177of597submissions,30%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader