Reconstructing a formal security model

被引:7
作者
Ahn, GJ [1 ]
Hong, SP
Shin, ME
机构
[1] Univ N Carolina, Dept Software & Informat Syst, Charlotte, NC 28223 USA
[2] George Mason Univ, Dept Informat & Software Engn, Fairfax, VA 22030 USA
关键词
access control; role-based; formal model; UML;
D O I
10.1016/S0950-5849(02)00092-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Role-based access control (RBAC) is a flexible approach to access control, which has generated great interest in the security community. The principal motivation behind RBAC is to simplify the complexity of administrative tasks. Several formal models of RBAC have been introduced. However, there are a few works specifying RBAC in a way which system developers or software engineers can easily understand and adopt to develop role-based systems. And there still exists a demand to have a practical representation of well-known access control models for system developers who work on secure system development. In this paper we represent a well-known RBAC model with software engineering tools such as Unified Modeling Language (UML) and Object Constraints Language (OCL) to reduce a gap between security models and system developments. The UML is a general-purpose visual modeling language in which we can specify, visualize, and document the components of a software system. And OCL is part of the UML and has been used for object-oriented analysis and design as a de facto constraints specification language in software engineering arena. Our representation is based on a standard model for RBAC proposed by the National Institute of Standards and Technology. We specify this RBAC model with UML including three views: static view, functional view, and dynamic view. We also describe how OCL can specify RBAC constraints that is one of important aspects to constrain what components in RBAC are allowed to do. In addition, we briefly discuss future directions of this work. (C) 2002 Elsevier Science B.V All rights reserved.
引用
收藏
页码:649 / 657
页数:9
相关论文
共 24 条
[1]  
AHN GJ, 2000, ACM T INFORMATION SY, V3
[2]  
[Anonymous], 2000, UNIFIED MODELING LAN, DOI DOI 10.1007/3-540-40011-7_10
[3]  
Chen F., 1995, P 1 ACM WORKSH ROL B, P39
[4]   Towards a UML based approach to role engineering [J].
Epstein, P ;
Sandhu, R .
FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, :135-143
[5]  
FERRAIOLO D, 2001, ACM T INFORMATION SY, V4
[6]  
Ferriaolo David, 1992, P 15 NATL COMP SEC C, P554
[7]   A formal model for role-based access control with constraints [J].
Giuri, L ;
Iglio, P .
9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, :136-145
[8]  
HU MY, 1995, DATABASE SECURITY, V8
[9]  
Jaeger T., 1999, Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99), P135, DOI 10.1109/ENABL.1999.806940
[10]  
JAEGER T, 2002, IN PRESS ACM T INFOR, V4