Download presentation
Presentation is loading. Please wait.
Published byJocelyn Bruce Modified over 11 years ago
1
© 2005 Ravi Sandhu www.list.gmu.edu Role Usage and Activation Hierarchies (best viewed in slide show mode) Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu sandhu@gmu.edu
2
© 2005 Ravi Sandhu www.list.gmu.edu 2 Reference Ravi Sandhu, Role Hierarchies and Constraints for Lattice-Based Access Controls. Proc. Fourth European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, pages 65-79. Published as Lecture Notes in Computer Science, Computer Security- ESORICS96 (Elisa Bertino et al, editors), Springer-Verlag, 1996. Ravi Sandhu, Role Activation Hierarchies. Proc. Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, October 22-23, 1998, pages 33-40. Sylvia Osborn, Ravi Sandhu and Qamar Munawer. Configuring Role- Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, Volume 3, Number 2, May 2000, pages 85-106.
3
© 2005 Ravi Sandhu www.list.gmu.edu 3 Role hierarchies Two aspects Role usage: permission inheritance Role activation: activation hierarchy RBAC96 combines both aspects in a single hierarchy ANSI/NIST standard model leaves this open Do one or both, just make it clear what you are doing
4
© 2005 Ravi Sandhu www.list.gmu.edu 4 Example Role Hierarchy
5
© 2005 Ravi Sandhu www.list.gmu.edu 5 LBAC to RBAC
6
© 2005 Ravi Sandhu www.list.gmu.edu 6 Simple security property some variations of LBAC use 2 labels for subjects λ r for read and λ w for read λ r = λ w for the single label case
7
© 2005 Ravi Sandhu www.list.gmu.edu 7 Variations of *-property
8
© 2005 Ravi Sandhu www.list.gmu.edu 8 LBAC to RBAC: independent read-write hierarchies
9
© 2005 Ravi Sandhu www.list.gmu.edu 9 LBAC to RBAC: intertwined read-write hierarchies
10
© 2005 Ravi Sandhu www.list.gmu.edu 10 Activation hierarchies and dynamic SOD
11
© 2005 Ravi Sandhu www.list.gmu.edu 11 Formal definition
12
© 2005 Ravi Sandhu www.list.gmu.edu 12 Activation hierarchy with non-maximal roles
13
© 2005 Ravi Sandhu www.list.gmu.edu 13 Read-write RBAC and LBAC
14
© 2005 Ravi Sandhu www.list.gmu.edu 14 LBAC with trusted strict *-property
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.