Published in

2009 International Conference on Computational Science and Engineering

DOI: 10.1109/cse.2009.325

Links

Tools

Export citation

Search in Google Scholar

A Framework for Enforcing Constrained RBAC Policies

Proceedings article published in 2009 by Jason Crampton, Hemanth Khambhammettu
This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the policy. In order to decide whether an access request is authorized, existing constraint enforcement mechanisms perform both authorization checking, which verifies that the requested operation is sufficiently authorized, and constraint checking, which checks whether permitting the operation would violate any constraint. The decision functions of large-scale systems, where hundreds of requests arise concurrently, require relatively simple decision-making algorithms. Performing constraint checking when deciding whether an access request is authorized introduces an additional overhead. In this paper, we describe a new framework for enforcing constraints that only requires us to perform authorization checking when deciding an access request. Essentially, we transform the constraint checking problem into an authorization checking problem by modifying authorization state following the success of an access request.