skip to main content
10.1145/344287.344298acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free Access

TRBAC: a temporal role-based access control model

Published:26 July 2000Publication History

ABSTRACT

Role-based access control (RBAC) models are receiving increasing attention as a generalized approach to access control. Roles can be active at certain time periods and non active at others; moreover, there can be activation dependencies among roles. To tackle such dynamic aspects, we introduce Temporal-RBAC (TRBAC), an extensions of the RBAC model. TRBAC supports both periodic activations and deactivations of roles, and temporal dependencies among such actions, expressed by means of role triggers, whose actions may be either executed immediately, or be deferred by an explicity specified amount of time. Both triggers and periodic activations/deactivations may have a priority associated with them, in order to resolve conflicting actions. A formal semantics for the specification language is provided, and a polynomial safeness check is introduced to reject ambiguous or inconsistent specifications. Finally, an implementation architecture is outlined.

References

  1. 1.E. Bertino, C. Bettini, E. Ferrari, P. Samarati. An Access Control Model Supporting Periodicity Constraints and Temporal reasoning. ACM Transactions on Database systems, 23(3):231-285, September 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.T. H. Cormen, C.E.Leiserson, R.L.Rivest. Introduction to Algorithms. MIT Press, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.T. Jaeger, A. Prakash, J. Liedtke, and N. Islam. Flexible Control of Downloaded Executable Content. ACM Transactions on Information and System Security, 2(2):177-228, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. Jonscher, J. Moffet, and K. Dittrich. Complex Subjects or: the striving for Complexity is Ruling our World. In Database Security VII: Status and Prospects, pages 19-37, North Holland, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.M. Niezette and J. Stevenne. An efficient symbolic representation of periodic time. In Proc. First International Conference on Information and Knowledge Management, 1992.Google ScholarGoogle Scholar
  6. 6.M. Nyanchama and S. Osborn. Role-based Security, Object Oriented Databases & Separation of Duty. Sigmod Record, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.Proc. of the Second ACM Workshop on Role-Based Access Control, Fairfax (VA), 1997.Google ScholarGoogle Scholar
  8. 8.Proc. of the Third ACM Workshop on Role-Based Access Control, Fairfax (VA), 1998.Google ScholarGoogle Scholar
  9. 9.Proc. of the Fourth ACM Workshop on Role-Based Access Control, Fairfax (VA), 1999.Google ScholarGoogle Scholar
  10. 10.R. Sandhu. Separation of Duties in Computerized Information Systems. In Database Security IV: Status and Prospects, pages 179-189. North Holland, 1991.Google ScholarGoogle Scholar
  11. 11.R. Sandhu. Role Hierarchies and Constraints for Lattice-based access Controls. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security - Esorics'96, LNCS N. 1146, Rome, Italy, 1996, pages 65-79. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.R. Sandhu. Role-based Access Control. Advances in Computers, vol. 46, Academic Press, 1998.Google ScholarGoogle Scholar

Index Terms

  1. TRBAC: a temporal role-based access control model

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
              July 2000
              119 pages
              ISBN:158113259X
              DOI:10.1145/344287

              Copyright © 2000 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 26 July 2000

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader