Skip to main content

An Administrative Model for Spatio-Temporal Role Based Access Control

  • Conference paper
Information Systems Security (ICISS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8303))

Included in the following conference series:

Abstract

In the present computing environment, access control decisions are often based on contextual information like the location of users and objects as well as the time of making an access request. Several variants of Role based Access Control (RBAC) have recently been proposed that support spatio-temporal policy specifications. However, unlike the administrative models available for RBAC, there is no reported literature on complete administrative models for spatio-temporal role based access control. In this paper, we introduce an administrative model for the recently proposed ESTARBAC (Enhanced Spatio-temporal Role based Access Control) model and name it as ADMINESTAR (Administrative model for Enhanced Spatio-Temporal Role based Access Control). ADMINESTAR defines a broad range of administrative rules and administrative operations. An instance of the set of administrative rules frames the currently effective administrative policy for the system. Administrative rules specify which administrative role can change which ESTARBAC entity. These ESTARBAC entities together define the system state which can be changed by administrative operations upon their successful execution under the control of defined administrative policies. ADMINESTAR would help in practical deployment of spatio-temporal role based access control systems and also provide a means for their formal security analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer, 38–47 (1996)

    Google Scholar 

  2. Osborn, S.: Mandatory access control and role-based access control revisited. In: Proc. of the 2nd ACM Workshop on Role-Based Access Control, RBAC 1997, pp. 31–40 (1997)

    Google Scholar 

  3. Osborn, S., Sandhu, R., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security (TISSEC), 85–106 (2000)

    Google Scholar 

  4. Ray, I., Toahchoodee, M.: A spatio-temporal role-based access control model. In: Proc. of the IFIP WG11.3 Conference on Data and Applications Security and Privacy (DBSec), pp. 211–226 (2007)

    Google Scholar 

  5. Aich, S., Sural, S., Majumdar, A.: STARBAC: spatio tempor al role based access control. In: Meersman, R. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1567–1582. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  6. Aich, S., Mondal, S., Sural, S., Majumdar, A.K.: Role based access control with spatio-temporal context for mobile applications. Transactions on Computational Science IV, 177–199 (2009)

    Google Scholar 

  7. Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security (TISSEC), 105–135 (1999)

    Google Scholar 

  8. Li, N., Mao, Z.: Administration in Role-Based Access Control. In: Proc. of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS), pp. 127–138 (2007)

    Google Scholar 

  9. Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A temporal role based access control model. ACM Transactions on Information and System Security, 191–233 (2001)

    Google Scholar 

  10. Toahchoodee, M., Ray, I.: On the formalization and analysis of a spatio-temporal role-based access control model. Journal of Computer Security, 399–452 (2011)

    Google Scholar 

  11. Toahchoodee, M., Ray, I.: Using alloy to analyse a spatio-temporal access control model supporting delegation. IET Information Security, 75–113 (2009)

    Google Scholar 

  12. Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: A spatially aware RBAC. ACM Transactions on Information and System Security, 29–37 (2007)

    Google Scholar 

  13. Ray, I., Kumar, M., Yu, L.: LRBAC: A Location-Aware Role-Based Access Control Model. In: Bagchi, A., Atluri, V. (eds.) ICISS 2006. LNCS, vol. 4332, pp. 147–161. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  14. Li, N., Tripunitara, M.: Security analysis in role-based access control. ACM Transactions on Information and System Security, 391–420 (2006)

    Google Scholar 

  15. Jha, S., Li, N., Tripunitara, M., Wang, Q., Winsborough, W.: Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing, 242–255 (2008)

    Google Scholar 

  16. Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering, 4–23 (2005)

    Google Scholar 

  17. Sandhu, R., Munawer, Q.: The ARBAC99 model for administration of roles. In: Proc. of the 15th Annual Computer Security Applications Conference, ACSAC 1999, pp. 229–238 (1999)

    Google Scholar 

  18. Sandhu, R., Oh, S.: A model for role administration using organization structure. SACMAT 2002. In: Proc. of the 7th ACM Symposium on Access Control Models and Technologies, pp. 155–162 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sharma, M., Sural, S., Atluri, V., Vaidya, J. (2013). An Administrative Model for Spatio-Temporal Role Based Access Control. In: Bagchi, A., Ray, I. (eds) Information Systems Security. ICISS 2013. Lecture Notes in Computer Science, vol 8303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45204-8_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45204-8_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45203-1

  • Online ISBN: 978-3-642-45204-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics