Privacy-Aware Role-Based Access Control

被引:25
作者
Ni, Qun [1 ]
Bertino, Elisa [1 ]
Lobo, Jorge
Calo, Seraphin B.
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Model; Obligation; Policy; Privacy; Role-based access control;
D O I
10.1109/MSP.2009.102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A privacy-aware role-based access control (P-RBAC) model that extends RBAC to express complex privacy-related policies, including such features as conditions and obligations is discussed. P-RBAC is easy to deploy in systems already adopting RBAC, thus allowing seamless integration of access control and privacy policies. Conditional P-RBAC introduces permission assignment sets and complex Boolean expressions. It can express more complex conditions than those supported by core P-RBAC's condition language. Hierarchical P-RBAC introduces the notions of role hierarchy, object hierarchy, and purpose hierarchy. P-RBAC can represent privacy law rules with obligations using a rule from COPPA. P-RBAC features method that deals with obligations with subject binding instead of action binding.
引用
收藏
页码:35 / 43
页数:9
相关论文
共 13 条
  • [1] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P143
  • [2] Anderson A., 2006, SWS 06, P53
  • [3] Provisions and Obligations in Policy Rule Management
    Claudio Bettini
    Sushil Jajodia
    X. Sean Wang
    Duminda Wijesekera
    [J]. Journal of Network and Systems Management, 2003, 11 (3) : 351 - 372
  • [4] Dougherty DJ, 2007, LECT NOTES COMPUT SC, V4734, P375
  • [5] Ferraiolo D. F., 2001, ACM Transactions on Information and Systems Security, V4, P224, DOI 10.1145/501978.501980
  • [6] Irwin K., 2006, P 13 ACM C COMPUTER, P134
  • [7] LeFevre K., 2004, Proceedings of the Thirtieth International Conference on Very Large Data Bases, P108
  • [8] Ni Q, 2007, SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P41
  • [9] Ni Q, 2007, LECT NOTES COMPUT SC, V4734, P72
  • [10] Ni Q, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P133