2009 Annual Computer Security Applications Conference 2009
DOI: 10.1109/acsac.2009.12
|View full text |Cite
|
Sign up to set email alerts
|

How to Securely Break into RBAC: The BTG-RBAC Model

Abstract: Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. RBAC is a rigid model where access control decisions have only two output options: Grant or Deny. Break The Glass (BTG) policies on the other hand are flexible and allow users to break or override the access controls in a controlled and justifiable manner. The main objective of this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
61
0
2

Year Published

2012
2012
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 85 publications
(64 citation statements)
references
References 9 publications
1
61
0
2
Order By: Relevance
“…The designer specifies in advance who, in exceptional cases, will have access rights he normally does not have. In line with [6], the prerequisites to "break the glass" from the application perspective are: (1) regular access is denied, (2) BTG access is foreseen for the exceptional case, (3) a user explicitly asks for access, (4) optionally, another user has to agree to this access. We call the sequence of steps when users ask for exceptional access BTG steps in the following.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The designer specifies in advance who, in exceptional cases, will have access rights he normally does not have. In line with [6], the prerequisites to "break the glass" from the application perspective are: (1) regular access is denied, (2) BTG access is foreseen for the exceptional case, (3) a user explicitly asks for access, (4) optionally, another user has to agree to this access. We call the sequence of steps when users ask for exceptional access BTG steps in the following.…”
Section: Introductionmentioning
confidence: 99%
“…From the perspective of the components enforcing authorizations for data access, the application has to perform several tasks for a BTG option and the compensating obligations [6]: First, the authorization system must deny a regular request, but offer the possibility for a BTG access to the application. In the next step, the holder of BTG Access Role must explicitly ask for access under BTG conditions.…”
Section: Embedding Btg Functionality Into Business Processesmentioning
confidence: 99%
See 1 more Smart Citation
“…BTG: Break-the-glass has been proposed as part of access control in healthcare and gives the possibility to override (temporarily or as specified) the access control policy in a controlled manner, for instance, in emergency or unanticipated situations [26]; PURUSE: Purpose of use has been suggested by the HL7 Security Technical…”
Section: Access Controlmentioning
confidence: 99%
“…These constraints are also necessary in order to create temporary roles, which are defined for a specific limited time (e.g., delegation or BTG); DELEG: Delegation is also part of the model proposed in [22] and it allows granting temporary access permissions to healthcare professionals who normally do not treat the patient (i.e., asking for a second opinion). OBLS: Obligations in healthcare were proposed in [26]. These are secondary actions triggered by primary actions.…”
Section: Access Controlmentioning
confidence: 99%