Practical safety in flexible access control models
- 1 May 2001
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 4 (2) , 158-190
- https://doi.org/10.1145/501963.501966
Abstract
Assurance that an access control configuration will not result in the leakage of a right to an unauthorized principal, called safety , is fundamental to ensuring that the most basic of access control policies can be enforced. It has been proven that the safety of an access control configuration cannot be decided for a general access control model, such as Lampson's access matrix, so safety is achieved either through the use of limited access control models or the verification of safety via constraints. Currently, almost all safety critical systems use limited access control models, such as Bell--LaPadula or Domain and Type Enforcement, because constraint expression languages are far too complex for typical administrators to use properly. However, researchers have identified that most constraints belong to one of a few basic types, so our goal is to develop a constraint expression model in which these constraints can be expressed in a straightforward way and extensions can be made to add other constraints, if desired. Our approach to expressing constraints has the following properties: (1) an access control policy is expressed using a graphical model in which the nodes represent sets (e.g., of subjects, objects, etc.) and the edges represent binary relationships on those sets and (2) constraints are expressed using a few, simple set operators on graph nodes. The basic graphical model is very simple, and we extend this model only as necessary to satisfy the identified constraint types. Since the basic graphical model is also general, further extension to support other constraints is possible, but such extensions should be made with caution as each increases the complexity of the model. Our hope is that by keeping the complexity of constraint expression in check, flexible access control models, such as role-based access control, may also be used for expressing access control policy for safety-critical systems.Keywords
This publication has 32 references indexed in Scilit:
- Role-based authorization constraints specificationACM Transactions on Information and System Security, 2000
- Flexible control of downloaded executable contentACM Transactions on Information and System Security, 1999
- The ARBAC97 model for role-based administration of rolesACM Transactions on Information and System Security, 1999
- The specification and enforcement of authorization constraints in workflow management systemsACM Transactions on Information and System Security, 1999
- The role graph model and conflict of interestACM Transactions on Information and System Security, 1999
- Conflicts in policy-based distributed systems managementIEEE Transactions on Software Engineering, 1999
- Role-based access control modelsComputer, 1996
- The schematic protection modelJournal of the ACM, 1988
- Protection in operating systemsCommunications of the ACM, 1976
- ProtectionACM SIGOPS Operating Systems Review, 1974