2009
DOI: 10.1007/978-3-642-00768-2_4
|View full text |Cite
|
Sign up to set email alerts
|

RBAC-PAT: A Policy Analysis Tool for Role Based Access Control

Abstract: Abstract. Role-Based Access Control (RBAC) has been widely used for expressing access control policies. Administrative Role-Based Access Control (AR-BAC) specifies how an RBAC policy may be changed by each administrator. Because sequences of changes by different administrators may interact in unintended ways, it is often difficult to fully understand the effect of an ARBAC policy by simple inspection. This paper presents RBAC-PAT, a tool for analyzing RBAC and ARBAC policies, which supports analysis of various… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(64 citation statements)
references
References 6 publications
0
64
0
Order By: Relevance
“…ReduceAdmin evaluation. We evaluate ReduceAdmin on two sets of realistic ARBAC policies without separate administration, used in several case studies [22,7,9,21]: a hospital and a university policy [19]. Table 3 summarizes the results of our evaluation.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…ReduceAdmin evaluation. We evaluate ReduceAdmin on two sets of realistic ARBAC policies without separate administration, used in several case studies [22,7,9,21]: a hospital and a university policy [19]. Table 3 summarizes the results of our evaluation.…”
Section: Resultsmentioning
confidence: 99%
“…Stoller et al [22] identify the fixedparameter complexity of the problem, and show that the problem is tractable if we fix the number of roles. Their techniques are implemented in the RBAC-PAT tool [7]. In more recent work, Stoller et al have extended the ARBAC model to parameterized ARBAC that allows conditions that depend on parameters [21].…”
Section: Introductionmentioning
confidence: 99%
“…Fisler et al transform access control policies into decision diagrams that can be queried [17]; Hughes and Bultan use a SAT solver on XACML policies to verify that the policy conforms to some properties [19]. Gofman et al verify properties of RBAC and ARBAC (another RBAC extension) models using RBAC-PAT [18]. The Ponder2 framework also provides policy verification capabilities, using event calculus [6].…”
Section: Access Control and Verificationmentioning
confidence: 99%
“…Automated analysis and verification of access-control policies is an active area of research [11,15,[19][20][21][22][23]28,29,31,41,43,46,49,50]. Model checking [8] has emerged as a promising, automated approach [15,23,46] to the verification problem.…”
Section: Introductionmentioning
confidence: 99%
“…Model checking [8] has emerged as a promising, automated approach [15,23,46] to the verification problem. In this approach, a model checker takes as input an access-control policy and a security property, and declares whether or not the policy adheres to the input security property.…”
Section: Introductionmentioning
confidence: 99%