Supporting Relationships in Access Control Using Role Based Access Control

65Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The Role Based Access Control (RBAC) model and mechanism have proven to be useful and effective. This is clear from the many RBAC implementations in commercial products. However, there are many common examples where access decisions must include other factors, in particular, relationships between entities, such as, the user, the object to be accessed, and the subject of the information contained within the object. Such relationships are often not efficiently represented using traditional static security attributes centrally administered. Furthermore, the extension of RBAC models to include relationships obscures the fundamental RBAC metaphor. This paper furthers the concept of relationships for use in access control, and it shows how relationships can be supported in role based access decisions by using the Object Management Group's (OMG) Resource Access Decision facility (RAD). This facility allows relationship information, which can dynamically change as part of normal application processing, to be used in access decisions by applications. By using RAD, the access decision logic is separate from application logic. In addition, RAD allows access decision logic from different models to be combined into a single access decision. Each access control model is thus able to retain its metaphor.

Cite

CITATION STYLE

APA

Barkley, J., Beznosov, K., & Uppal, J. (1999). Supporting Relationships in Access Control Using Role Based Access Control. In RBAC 1999 - Proceedings of the 4th ACM Workshop on Role-Based Access Control (pp. 55–65). Association for Computing Machinery, Inc. https://doi.org/10.1145/319171.319177

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free