Budget-aware Role Based Access Control

被引:5
作者
Salim, Farzad [1 ]
Reid, Jason [1 ]
Dulleck, Uwe [2 ]
Dawson, Ed [1 ]
机构
[1] Queensland Univ Technol, Inst Future Environm, Brisbane, Qld 4001, Australia
[2] Queensland Univ Technol, Sch Econ & Finance, Brisbane, Qld, Australia
关键词
Insider problem; Role Based Access Control; Misaligned incentives; Price discrimination; Economics of Information security; SYSTEMS;
D O I
10.1016/j.cose.2012.11.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic environments like healthcare. In an RBAC system, a user's legitimate access may be denied if their need has not been anticipated by the security administrator at the time of policy specification. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. The heart of the challenge is the intrinsic unpredictability of users' operational needs as well as their incentives to misuse permissions. In this paper we propose a novel Budget-aware Role Based Access Control (B-RBAC) model that extends RBAC with the explicit notion of budget and cost, where users are assigned a limited budget through which they pay for the cost of permissions they need. We propose a model where the value of resources are explicitly defined and an RBAC policy is used as a reference point to discriminate the price of access permissions, as opposed to representing hard and fast rules for making access decisions. This approach has several desirable properties. It enables users to acquire unassigned permissions if they deem them necessary. However, users misuse capability is always bounded by their allocated budget and is further adjustable through the discrimination of permission prices. Finally, it provides a uniform mechanism for the detection and prevention of misuses. (C) 2012 Elsevier Ltd. All rights reserved.
引用
收藏
页码:37 / 50
页数:14
相关论文
共 38 条
[1]   The economics of information security [J].
Anderson, Ross ;
Moore, Tyler .
SCIENCE, 2006, 314 (5799) :610-613
[2]  
[Anonymous], 2000, NY TIMES
[3]  
[Anonymous], 1992, 15 NAT COMP SEC C
[4]  
[Anonymous], 1973, SECURE COMPUTER SYST
[5]  
[Anonymous], DATA BREACH INVESTIG
[6]  
Appari Ajit, 2010, International Journal of Internet and Enterprise Management, V6, P279, DOI 10.1504/IJIEM.2010.035624
[7]  
Bartsch S., 2010, Proceedings of the 3rd international conference on Security of information and networks, P62
[8]  
BBC, 2009, BBC JUL
[9]  
Bishop Matt., 2009, P 42 HAWAII INT C SY, P1, DOI [DOI 10.1109/HICSS.2009, 10.1109/HICSS.2009.104, DOI 10.1109/HICSS.2009.104]
[10]  
Celikel E., 2009, RISK DECISION ANAL, V1, P21, DOI DOI 10.3233/RDA-2008-0002