Security Analysis of RBAC with Temporal Constraints - A Model Checking Approach

被引:0
作者
Mondal, Samrat [1 ]
Sural, Shamik [1 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur, W Bengal, India
来源
JOURNAL OF INFORMATION ASSURANCE AND SECURITY | 2009年 / 4卷 / 04期
关键词
TRBAC; Timed Automata; Security Analysis; Model Checking; CTL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role Based Access Control (RBAC) is a well accepted access control mechanism for various applications such as database management systems, operating systems, etc. The traditional RBAC models, however, cannot handle the time varying nature of access control policies. Temporal RBAC (TRBAC) has been developed on top of the RBAC model to incorporate various temporal constraints. In this paper, a security analysis framework is proposed for TRBAC. For this purpose timed automata based model checking approach is suggested. A timed automaton is a state transition system with real valued clocks. Each role of a TRBAC system is modeled using a timed automaton. Temporal constraints on role enabling and disabling are specified in a separate automaton, known as the controller automaton. The timed automaton is constructed in such a way that it can handle role trigger, an important feature of TRBAC. The desirable security properties are specified using Computation Tree Logic (CTL) and verified against the proposed model. We have specifically considered safety and liveness properties to show the usefulness of our approach.
引用
收藏
页码:319 / 328
页数:10
相关论文
共 31 条
[1]  
Ahmed T., 2003, P 8 ACM S ACCESS CON, P196
[2]  
Aich S, 2007, LECT NOTES COMPUT SC, V4804, P1567
[3]  
Aich S, 2009, LECT NOTES COMPUT SC, V5430, P177, DOI 10.1007/978-3-642-01004-0_10
[4]  
Alur R., 1990, Proceedings. Fifth Annual IEEE Symposium on Logic in Computer Science (90CH2897-7), P414, DOI 10.1109/LICS.1990.113766
[5]  
Alur R., 1990, P 17 INT C AUT LANG, P322
[6]  
Behrmann G, 2004, LECT NOTES COMPUT SC, V3185, P200
[7]   Timed automata: Semantics, algorithms and tools [J].
Bengtsson, J ;
Yi, W .
LECTURES ON CONCURRENCY AND PETRI NETS: ADVANCES IN PETRI NETS, 2004, 3098 :87-124
[8]  
Bertino E., 2001, ACM Transactions on Information and Systems Security, V4, P191, DOI 10.1145/501978.501979
[9]   An access control model supporting periodicity constraints and temporal reasoning [J].
Bertino, E ;
Bettini, C ;
Ferrari, E ;
Samarati, P .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 1998, 23 (03) :231-285
[10]  
Bertino E., 2005, P 10 ACM S ACC CONTR, P29, DOI DOI 10.1145/1063979.1063985