Publication | Open Access
Configuring role-based access control to enforce mandatory and discretionary access control policies
572
Citations
13
References
2000
Year
EngineeringInformation SecurityLawAuthorizationAuthentication Access ControlSecure Network AccessLogical Access ControlAccess MethodAccess ControlAuthorization PoliciesSystems EngineeringModeling And SimulationSecurity ControlAccess Control ModelsDiscretionary Access ControlNetworked Computer SystemsComputer ScienceData SecurityRole-based Access ControlRegulationComputer Security ModelMandatory Access Control
Access control models have traditionally included mandatory access control (or lattice-based access control) and discretionary access control. Subsequently, role-based access control has been introduced, along with claims that its mechanisms are general enough to simulate the traditional methods. In this paper we provide systematic constructions for various common forms of both of the traditional access control paradigms using the role-based access control (RBAC) models of Sandhu et al., commonly called RBAC96. We see that all of the features of the RBAC96 model are required, and that although for the manatory access control simulation, only one administrative role needs to be assumed, for the discretionary access control simulations, a complex set of administrative roles is required.
| Year | Citations | |
|---|---|---|
Page 1
Page 1