Data flow security in Role-based access control

被引:0
作者
Logrippo, Luigi [1 ,2 ]
机构
[1] Univ Quebec Outaouais, Dept Informat & Ingn, CP 1250, Succ Hull Gatineau, Gatineau, PQ J8X3X7, Canada
[2] Univ Ottawa, SEECS Elect Eng & Comp, Sc POB 450 Stn A, Ottawa, ON K1N 6N5, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
RBAC; Role-based access control; data flow; control; Data security; Data secrecy; Data confidentiality; Data integrity; Multi-level access control; Mandatory access control; Security labeling; Design for security; Role mining; INTERNET; THINGS; MODEL;
D O I
10.1016/j.jisa.2025.103997
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We show how data security concepts such as data flow, secrecy (or confidentiality) and integrity can be defined for RBAC, Role-Based Access Control. In contrast to the prevailing literature that uses a lattice model to express such concepts, we demonstrate the use of a partial order model that is more general. This is done by using the concepts of "partial order of equivalence classes" and of "security labels" that can be associated with RBAC subjects and objects and determine their mutual data flows, as well as their secrecy and integrity properties. Our model allows to reason on RBAC configurations with different assignments of roles to subjects. On the converse, we demonstrate a method for obtaining RBAC configurations from data security requirements or security label assignments. These results are supported by a proof showing that three methods for defining data flow: by access control matrices or lists, by labels and by roles, are equivalent and mutually convertible by efficient algorithms. We show how RBAC state changes, or "reconfigurations" can be defined in this framework, and what are the effects of elementary reconfigurations on data flow, secrecy and integrity of data.
引用
收藏
页数:14
相关论文
共 49 条
[1]  
Alramadhan M, 2017, 2017 26TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN 2017)
[2]  
[Anonymous], 1974, The Design and Analysis of Computer Algorithms
[3]  
Barkley J., 1997, P 2 ACM WORKSH ROL B, P127, DOI [10.1145/266741.266769, DOI 10.1145/266741.266769]
[4]  
Bell DE, 1976, MTR-2997
[5]  
Bertet K, 1997, INT KRUSE S KNOWL RE, P72
[6]   Access control in the Internet of Things: a survey of existing approaches and open research questions [J].
Bertin, Emmanuel ;
Hussein, Dina ;
Sengul, Cigdem ;
Frey, Vincent .
ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) :375-388
[7]  
Biba K., 1977, Tech. Rep. TR-3153
[8]  
Birkhoff G., 1967, Lattice theory, V3
[9]  
Bishop M., 2019, Computer security, Art and Science, VSecond
[10]   On the Feasibility of Attribute-Based Access Control Policy Mining [J].
Chakraborty, Shuvra ;
Sandhu, Ravi ;
Krishnan, Ram .
2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, :245-252