A model of OASIS role-based access control and its support for active security
Top Cited Papers
- 1 November 2002
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 5 (4) , 492-540
- https://doi.org/10.1145/581271.581276
Abstract
OASIS is a role-based access control architecture for achieving secure interoperation of services in an open, distributed environment. The aim of OASIS is to allow autonomous management domains to specify their own access control policies and to interoperate subject to service level agreements (SLAs). Services define roles and implement formally specified policy to control role activation and service use; users must present the required credentials, in an appropriate context, in order to activate a role or invoke a service. All privileges are derived from roles, which are activated for the duration of a session only. In addition, a role is deactivated immediately if any of the conditions of the membership rule associated with its activation becomes false. These conditions can test the context, thus ensuring active monitoring of security.To support the management of privileges, OASIS introduces appointment . Users in certain roles are authorized to issue other users with appointment certificates , which may be a prerequisite for activating one or more roles. The conditions for activating a role at a service may include appointment certificates as well as prerequisite roles and constraints on the context. An appointment certificate does not therefore convey privileges directly but can be used as a credential for role activation. The lifetime of appointment certificates is not restricted to the issuing session, so they can be used as long-lived credentials to represent academic and professional qualification, or membership of an organization.Role-based access control (RBAC), in associating privileges with roles, provides a means of expressing access control that is scalable to large numbers of principals. However, pure RBAC associates privileges only with roles, whereas applications often require more fine-grained access control. Parametrized roles extend the functionality to meet this need.We motivate our approach and formalise OASIS. We first present the overall architecture through a basic model, followed by an extended model that includes parametrization.Keywords
This publication has 11 references indexed in Scilit:
- Toward open, secure, widely distributed servicesCommunications of the ACM, 2002
- Translating Role-Based Access Control Policy within ContextPublished by Springer Nature ,2001
- Role-based authorization constraints specificationACM Transactions on Information and System Security, 2000
- Generic support for distributed applicationsComputer, 2000
- An Architecture for Distributed OASIS ServicesPublished by Springer Nature ,2000
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- The role graph model and conflict of interestACM Transactions on Information and System Security, 1999
- A role-based access control model and reference implementation within a corporate intranetACM Transactions on Information and System Security, 1999
- A temporal access control mechanism for database systemsIEEE Transactions on Knowledge and Data Engineering, 1996
- The protection of information in computer systemsProceedings of the IEEE, 1975