2002
DOI: 10.1145/567331.567336
|View full text |Cite
|
Sign up to set email alerts
|

Context sensitivity in role-based access control

Abstract: This paper describes an extended role-based access control (RBAC) model, which makes RBAC sensitive to the context of an attempted operation. Traditional RBAC does not specify whether the permissions associated with a role enable access to a particular object, or to some subset of objects belonging to a class. We extend the model by introducing the notions of role context and context filters. Context filters are Boolean expressions based o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
41
0
4

Year Published

2005
2005
2011
2011

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(45 citation statements)
references
References 8 publications
0
41
0
4
Order By: Relevance
“…Context-aware access control strategies fall in two main categories. The first category is the one of techniques aimed at granting or denying access to resources considering the context of the requesting user and of the resource (see, e.g., [19][20][21]). The second category is the one of techniques aimed at controlling the release of user's context data on the basis of the context of the requesting entity and of the user herself.…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…Context-aware access control strategies fall in two main categories. The first category is the one of techniques aimed at granting or denying access to resources considering the context of the requesting user and of the resource (see, e.g., [19][20][21]). The second category is the one of techniques aimed at controlling the release of user's context data on the basis of the context of the requesting entity and of the user herself.…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%
“…However, the baseline RBAC model is not adequate to pervasive and mobile computing domains, which are characterized by the dynamics of situations that may determine the role played by a given entity in a given context. For this reason, various proposals have been made to extend RBAC policies with contextual conditions (see, e.g., [19]), and in particular with spatio-temporal constraints (e.g., [30]). More recently, this approach has been applied to the privacy protection of personal context data.…”
Section: Network and Cryptographic Protocolsmentioning
confidence: 99%
“…Our concern in this paper is the construction of access control policies that rely on context to inform decisions. (Arguments as to the potential benefits of context-sensitive access control have been made by, for example, [1], [2], and [3].) Specifically, our concern is what might be termed evolving access controlwhereby access control decisions are made on the basis of state.…”
Section: Introductionmentioning
confidence: 99%
“…1 Of course, the use of access control policies can bring many benefits when managing complex systems: by centralising all authorisation decisions, consistency of access can be maintained, and updating a single access control policy is much simpler than modifying multiple components. Nevertheless, creating and updating access control policies is still a potentially time-consuming task.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation