A user-centered, modular authorization service built on an RBAC foundation
- 20 January 2003
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
Psychological acceptability has been mentioned as a requirement for secure systems for as long as least privi- lege and fail safe defaults, but until now has been all but ignored in the actual design of secure systems. We place this principle at the center of our design for Adage, an authorization service for distributed applications. We employ usability design techniques to specify and test the features of our authorization language and the corre- sponding administrative GUI. Our testing results reinforce our initial design center and suggest directions for deployment of our authorization services. A modular architecture allows us to experiment with our design during short term integration, and evolve it for longer term exploration. An RBAC foundation enables coherent design of flexible authorization constraints and queries. We discuss lessons learned from the implementation of this service through a planned deployment in a context that must balance new research in risk management with dependencies on legacy services.Keywords
This publication has 21 references indexed in Scilit:
- Conceptual foundations for a model of task-based authorizationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Role based access control framework for network enterprisesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logical language for expressing authorizationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Separation of duty in role-based environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- An introduction to intrusion detectionXRDS: Crossroads, The ACM Magazine for Students, 1996
- User-centered securityPublished by Association for Computing Machinery (ACM) ,1996
- Role-based access control modelsComputer, 1996
- Programmable applicationsACM SIGCHI Bulletin, 1995
- Essential modelingInteractions, 1995
- ProtectionACM SIGOPS Operating Systems Review, 1974