skip to main content
article

Proposed NIST standard for role-based access control

Published:01 August 2001Publication History
Skip Abstract Section

Abstract

In this article we propose a standard for role-based access control (RBAC). Although RBAC models have received broad support as a generalized approach to access control, and are well recognized for their many advantages in performing large-scale authorization management, no single authoritative definition of RBAC exists today. This lack of a widely accepted model results in uncertainty and confusion about RBAC's utility and meaning. The standard proposed here seeks to resolve this situation by unifying ideas from a base of frequently referenced RBAC models, commercial products, and research prototypes. It is intended to serve as a foundation for product development, evaluation, and procurement specification. Although RBAC continues to evolve as users, researchers, and vendors gain experience with its application, we feel the features and components proposed in this standard represent a fundamental and stable set of mechanisms that may be enhanced by developers in further meeting the needs of their customers. As such, this document does not attempt to standardize RBAC features beyond those that have achieved acceptance in the commercial marketplace and research community, but instead focuses on defining a fundamental and stable set of RBAC components. This standard is organized into the RBAC Reference Model and the RBAC System and Administrative Functional Specification. The reference model defines the scope of features that comprise the standard and provides a consistent vocabulary in support of the specification. The RBAC System and Administrative Functional Specification defines functional requirements for administrative operations and queries for the creation, maintenance, and review of RBAC sets and relations, as well as for specifying system level functionality in support of session attribute management and an access control decision process.

References

  1. AHN,G.AND SANDHU, R. 2000. Role-based authorization constraints specification. ACMTrans. Inf. Syst. Sec. 3, 4 (Nov.). Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. BALDWIN, R. W. 1990. Naming and grouping privileges to simplify security management in large databases. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 116-132.Google ScholarGoogle ScholarCross RefCross Ref
  3. BELL,D.AND LAPADULA. 1976. Secure computer systems: Unified exposition and MULTICS. Tech. Rep. ESD-TR-75-306, The MITRE Corporation, Bedford, Mass., March.Google ScholarGoogle Scholar
  4. BERTINO, E., BONATTI,P.,AND FERRARI, E. 2000. TRBAC: A temporal role-based access control model. In Proceedings of the Fifth ACM Workshop on Role Based Access Control, 21-30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BREWER,D.AND NASH, M. 1989. The Chinese wall security policy. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 215-228.Google ScholarGoogle ScholarCross RefCross Ref
  6. CHANDRAMOULI,R.AND SANDHU, R. 1998. Role-based access control features in commercial database management systems. In Proceedings of the NIST-NSA National (USA) Computer Security Conference, 503-511.Google ScholarGoogle Scholar
  7. CLARK,D.AND WILSON, D. 1987. A comparison of commercial and military computer security policies. In proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 184-194.Google ScholarGoogle ScholarCross RefCross Ref
  8. FADEN, G. 1999. Rbac in Unix administration. In Proceedings of the Fourth ACM Workshop on Role Based Access Control, 95-101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. FEINSTEIN, H. 1996. Final report: NIST small business innovative research (SBIR) grant: Role based access control: phase 2. SETA Corp., October.Google ScholarGoogle Scholar
  10. FERRAIOLO,D.AND KUHN, R. 1992. Role-based access control. In Proceedings of the NIST-NSA National (USA) Computer Security Conference, 554-563.Google ScholarGoogle Scholar
  11. FERRAIOLO, D., BARKLEY,J.,AND KUHN, R. 1999. A role-based access control model and reference implementation within a corporate internet. ACM Trans. Inf. Syst. Sec. 2,1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. FERRAIOLO, D., CUGINI,J.,AND KUHN, R. 1995. Role-based access control: Features and motivations. In Proceedings of the Annual Computer Security Applications Conference, IEEE Press, Los Alamitos, Calif.Google ScholarGoogle Scholar
  13. FERRAIOLO, D., GILBERT,D.,AND LYNCH, N. 1993. An examination of federal and commercial access control policy needs. In Proceedings of the NIST-NSA National (USA) Computer Security Conference, 107-116.Google ScholarGoogle Scholar
  14. GAVRILA,S.AND BARKLEY, J. 1998. Formal specification for RBAC user/role and role relationship management. In Proceedings of the Third ACM Workshop on Role Based Access Control, 81-90. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. GIURI,L.AND IGLIO, P. 1996. A formal model for role based access control with constraints. In Proceedings of the Computer Security Foundations Workshop, IEEE Press, Los Alamitos, Calif., 136-145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. GLIGOR, V. D., GAVRILA,S.I.,AND FERRAIOLO, D. F. 1998. On the formal definition of separation-ofduty policies and their composition. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif.Google ScholarGoogle Scholar
  17. HUANG,W.AND ATLURI, V. 1999. A secure web-based workflow management system. In Proceedings of the Fourth ACM Workshop on Role Based Access Control, 83-84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. JAEQER, T. 1999. On the increased importance of constraints. In Proceedings of the Fourth ACM Workshop on Role-Based Access Control (Oct.), 33-42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. JAEGER,T.AND TIDSWELL, J. 2000. Rebuttal to the NIST RBAC model proposal. In proceedings of the Fifth ACM Workshop on Role-Based Access Control (Berlin, July), 65-66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. JOSHI,J.B.D.,AREF,W.G.,GHAFOOR, A., AND SPAFFORD, E.H. 2001a. Security models for web-based applications. Commun. ACM, 44, 2, Feb. 38-44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. JOSHI, J., GHAFOOR, A., AREF,W.G.,AND SPAFFORD, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Comput. 33, 2, Feb. 66-72. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. KUHN, D. R. 1998. Role based access control on MLS systems without kernel changes. In Proceedings of the ACM Workshop on Role Based Access Control (Oct. 22-23), 25-32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. KUHN, R. 1997. Mutual exclusion as a means of implementing separation of duty requirements in role based access control systems. In Proceedings of the Second ACM Workshop on Role Based Access Control, 23-30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. LAMPSON, B. 1974. Protection. ACM Oper. Syst. Rev. 8, 1, 18-24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. MCCOLLUM, C., MESSING,J.,AND NOTARGIACOMO, L. 1990. Beyond the pale of MAC and DAC- Defining new forms of access control. In Proceedings of the Symposium on Security and Privacy, IEEE Press, Los Alamitos, Calif., 190-900.Google ScholarGoogle ScholarCross RefCross Ref
  26. MOFFETT., J. D. 1998. Control principles and role hierarchies. In Proceedings of the Third ACM Workshop on Role-Based Access Control (Fairfax, V., Oct. 22-23), 63-69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. NYANCHAMA,M.AND OSBORN, S. 1994. Access rights administration in role-based security systems. In Database Security, VIII: Status and Prospects, J. Biskup, M. Morgenstern, and C. E. Landwehr, Eds., North-Holland, 37-56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. NYANCHAMA,M.AND OSBORN, S. 1999. The graph model and conflicts of interest. ACM Trans. Inf. Syst. Sec. 2,1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3,2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. SANDHU,R.AND BHAMIDIPATI, V. 1997. Role-based administration of user-role assignment: The URA97 model and its oracle implementation. J. Compu. Sec. 7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. SANDHU, R. 1998a. Role activation hierarchies. In Proceedings of the Third ACM Workshop on Role-Based Access Control (Fairfax, V., Oct. 22-23), 33-40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. SANDHU, R. 1998b. Role-based access control. In Advances in Computers, vol. 46, M. Zelkowitz Eds. Academic, 237-286.Google ScholarGoogle Scholar
  33. SANDHU, R. 1988. Transaction control expressions for separation of duties. In Proceedings of the Fourth Aerospace Computer Security Applications Conference (Orlando, Fla.). IEEE Computer Society Press, Dec. Los Alamitos, Calif., 282-286.Google ScholarGoogle ScholarCross RefCross Ref
  34. SANDHU, R., BHAMIDIPATI,V.,AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Sys. Sec. 2, 1, (Feb.), 105-135. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Comput., 29, (2), (Feb). Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. SANDHU, R., FERRAIOLO,D.,AND KUHN, R. 2000. The NIST model for role-based access control: Towards a unified standard. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control (Berlin, July), 47-63. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. SIMON,R.AND ZURKO, R. 1997. Separation of duty in role based access control environments. In Proceedings of New Security Paradigms Workshop, (Sept.).Google ScholarGoogle Scholar
  38. SMITH, C., COYNE, E., YOUMAN,C.,AND GANTA, S. 1996. Market analysis report: NIST small business innovative research (SBIR) grant: Role based access control: Phase 2. A marketing survey of civil federal government organizations to determine the need for role-based access control security product, SETA Corp., July.Google ScholarGoogle Scholar
  39. THOMSEN, D. J. 1991. Role-based application design and enforcement. In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds., North-Holland, 151-168.Google ScholarGoogle Scholar
  40. TING,T.C.,DEMURJIAN,S.A.,AND HU, M. Y. 1992. Requirements capabilities and functionalities of user-role based security for an object-oriented design model. In Database Security, IV: Status and Prospects, S. Jajodia and C. E. Landwehr, Eds., North-Holland, 275-296. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Proposed NIST standard for role-based access control

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Information and System Security
      ACM Transactions on Information and System Security  Volume 4, Issue 3
      August 2001
      129 pages
      ISSN:1094-9224
      EISSN:1557-7406
      DOI:10.1145/501978
      Issue’s Table of Contents

      Copyright © 2001 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 August 2001
      Published in tissec Volume 4, Issue 3

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader