2004
DOI: 10.1145/1015040.1015043
|View full text |Cite
|
Sign up to set email alerts
|

An integrated approach to engineer and enforce context constraints in RBAC environments

Abstract: We present an approach that uses special purpose role-based access control (RBAC) constraints to base certain access control decisions on context information. In our approach a context constraint is defined as a dynamic RBAC constraint that checks the actual values of one or more contextual attributes for predefined conditions. If these conditions are satisfied, the corresponding access request can be permitted. Accordingly, a conditional permission is an RBAC permission that is constrained by one or more cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
61
0
2

Year Published

2005
2005
2015
2015

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 93 publications
(63 citation statements)
references
References 47 publications
0
61
0
2
Order By: Relevance
“…The RBAC model may activate a role or grant permissions while taking into account the context under which the user makes the access request or the role activation request [21,19,34,24,22]. The RBAC model captures this context by defining contextual conditions.…”
Section: Overview Of Rbac Modelsmentioning
confidence: 99%
“…The RBAC model may activate a role or grant permissions while taking into account the context under which the user makes the access request or the role activation request [21,19,34,24,22]. The RBAC model captures this context by defining contextual conditions.…”
Section: Overview Of Rbac Modelsmentioning
confidence: 99%
“…Context constraints define predicates that must evaluate to "true" in order to grant a certain access request. They allow for the consideration of context information in access decisions and enable the definition of additional conditions on permissions, like time constraints for example (for details see [19]). Our RBAC DSL provides the functionality of the xoRBAC component (see [13,19]) as an expressive language that separates the different concerns in this component.…”
Section: Case Study: Modeling Interdependent Concerns In An Rbac Dslmentioning
confidence: 99%
“…They allow for the consideration of context information in access decisions and enable the definition of additional conditions on permissions, like time constraints for example (for details see [19]). Our RBAC DSL provides the functionality of the xoRBAC component (see [13,19]) as an expressive language that separates the different concerns in this component. To implement the RBAC DSL, we defined a domain-specific weaver component that is capable to weave the different concerns according to domain-specific restrictions.…”
Section: Case Study: Modeling Interdependent Concerns In An Rbac Dslmentioning
confidence: 99%
“…programming language independent) consistency checks. In particular, the algorithms result from the experiences we gained in the analysis, design, and implementation of corresponding software systems and tools (see, e.g., [6,9,10,13,14,15,16]). …”
Section: Introductionmentioning
confidence: 99%
“…Our work complements previous contributions by providing generic algorithms and procedures to ensure the design-time and runtime consistency of process-related RBAC models. The algorithms result from our experiences in analyzing, designing, and implementing corresponding software systems (see, e.g., [9,10,13,14,15,16]). …”
mentioning
confidence: 99%