2012
DOI: 10.1016/j.infsof.2012.06.008
|View full text |Cite
|
Sign up to set email alerts
|

Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL

Abstract: Context. Role-based access control (RBAC) has become the de facto standard for access management in various large-scale organizations. Often rolebased policies must implement organizational rules to satisfy compliance or authorization requirements, e.g., the principle of separation of duty (SoD). To provide business continuity, organizations should also support the delegation of access rights and roles, respectively. This, however, makes access control more complex and error-prone, in particular, when delegati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 38 publications
0
14
0
Order By: Relevance
“…Similarly, some break-glass approaches allow for the definition of break-glass policies for individual subjects (subject-based break-glass policies, see, e.g., [1,29,34]), others allow for the definition of break-glass policies on role-level (role-based break-glass policies, see, e.g., [7,16,45]). In addition, some of the delegation and break-glass models explicitly address entailment constraints (see, e.g., [39,42,45]). Entailment constraints define additional conditions for access control decisions by considering, e.g., the task history or certain context information (such as time or location).…”
Section: Development Of the Research Areamentioning
confidence: 99%
See 3 more Smart Citations
“…Similarly, some break-glass approaches allow for the definition of break-glass policies for individual subjects (subject-based break-glass policies, see, e.g., [1,29,34]), others allow for the definition of break-glass policies on role-level (role-based break-glass policies, see, e.g., [7,16,45]). In addition, some of the delegation and break-glass models explicitly address entailment constraints (see, e.g., [39,42,45]). Entailment constraints define additional conditions for access control decisions by considering, e.g., the task history or certain context information (such as time or location).…”
Section: Development Of the Research Areamentioning
confidence: 99%
“…A SOD constraint defines that two permissions/tasks must not be assigned to (or activated/performed by) the same subject, while a BOD constraint defines that two bound permissions/tasks need to be assigned to the same subject or role. Furthermore, some approaches offer modeling support to visualize the respective concepts, some approaches (also) provide corresponding tool support for enforcing delegation or break-glass policies (see, e.g., [37,38,42]). This variety presents a challenge for researchers working in this field or wishing to quickly grasp the state of research.…”
Section: Development Of the Research Areamentioning
confidence: 99%
See 2 more Smart Citations
“…Instances of patterns 1 to 3 can be checked over an authorization model instance, and instances of patterns 4 to 9 can be checked over a delegation model instance. In section 4.1, we introduce a banking example partially borrowed from [25]. We model this example and illustrate how patterns can be instantiated to detect SoD conflicts in this setting.…”
Section: Patterns To Check Separation Of Duties In Authorization Polimentioning
confidence: 99%