{"title":"Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization","authors":"Haio Roeckle, G. Schimpf, R. Weidinger","doi":"10.1145/344287.344308","DOIUrl":"https://doi.org/10.1145/344287.344308","url":null,"abstract":"In this paper we describe the work in progress with a process-oriented approach for role-finding to implement Role-Based Security Administration. Our results stem from using a recently proposed role model and procedural model at Siemens AG ICN, a large industrial organization.\u0000The core of this paper presents the data model, which integrates business processes, role based security administration and access control. Moreover, a structured top-down approach is outlined which is the basis for derivation of suitable business roles from enterprise process models.\u0000A brief description is given on how these results may be used to first build the Role Catalog and then support the implementation of RBAC and a single point of administration and control, using a cross-platform administration tool.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129023765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Three for one: role-based access-control management in rapidly changing heterogeneous environments","authors":"Axel Mönkeberg, René Rakete","doi":"10.1145/344287.344306","DOIUrl":"https://doi.org/10.1145/344287.344306","url":null,"abstract":"We describe a maintenance tool for role-based access-control (RBAC0, RBAC1 and RBAC2 [1]), implemented in a Swiss bank. Concept and implementation of the system is as far as possible independent of operating system and vendors. The tool supports the maintenance of the access control interface to database systems, operating systems, web server and application systems (e.g. workflow management systems [9], OLAP tools and analytic tools).\u0000It is based on the principle of using a system independent access-control specification-language (ADL), a repository for static definition and runtime data, a target system independent access-control command language (CDL) and a set of different target system specific implementations of the access-control maintenance interfaces (TDL).\u0000The system is able to maintain the access control interfaces of passive systems (e.g. common DBMS [5],[6],[7] and OS [8],[12],[10]) and supports also the access control mechanism of active systems. Active systems have no own authorization control mechanism implemented. Active systems check the authorization of operations of a particular user by calling a “central” authorization instance.\u0000The system is implemented in Java and SQL and uses the CORBA IIOP communication protocol.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130446021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of XML tools for enterprise-wide RBAC implementation tasks","authors":"R. Chandramouli","doi":"10.1145/344287.344297","DOIUrl":"https://doi.org/10.1145/344287.344297","url":null,"abstract":"The use of Extensible Markup Language (XML) and its associated APIs, for information modeling and information interchange applications is being actively explored by the reseach community. In this paper we develop an XML Document Type Definition (DTD) for representing the schema of a Role-based Access Control (RBAC) Model and a conforming XML document containing the actual RBAC-based access control data for a commercial banking application. Based on this DTD, the XML document and the methods in the Document Object Model (DOM) API Level 1.0 standards, we describe three application tasks related to enterprise-wide implementation of RBAC. They are: (a)implementing an RBAC model for a database application (b)implementing RBAC models with identical data on two different database servers and (c)transforming data under an RBAC model to a different, but structurally similar model like Group-based Access Control model. Other potential Access Control Service applications exploiting the capabilities of some commercial XML processors are also outlined.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The uses of role hierarchies in access control","authors":"J. Moffett, Emil C. Lupu","doi":"10.1145/319171.319186","DOIUrl":"https://doi.org/10.1145/319171.319186","url":null,"abstract":"The value of role-based access control (RBAC) is now well recognised. One aspect of it is the ability to make access decisions based upon the position of a role in a hierarchy. It is now recognised that there are some problems associated with this, because of the risk that these decisions may conflict with the control principles that are applied within an organisation. The aim of this paper is to identify the possible uses of role hierarchies in simplifying access rules, while remaining within the constraints of organisational control principles. We use the concept of authority state, i.e., the set of fixed and variable policies and rules in the system which influence the Reference Monitor's access decisions. We then consider the uses of role hierarchies in two separate contexts: first, within a static view of the authority state, where role hierarchies may be used by an access control decision facility; and second, as constraints upon permissible changes to the authority state. We conclude that role hierarchies have some possible uses within the static view, but that they are more important as a means of constraining the permissible changes to the authority state. We make proposals for further research on the place of role hierarchies in controlling change.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126163036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Migrating to role-based access control","authors":"Kami Brooks","doi":"10.1145/319171.319178","DOIUrl":"https://doi.org/10.1145/319171.319178","url":null,"abstract":"This project seeks to provide a single, GUI based security management interjiie for an existing, highly complex inform&on systems environment. Among the iaknt$ed requirements and goals for this project are, the use of Commercial O&Qhe-Shelfso*re, and the impkmentation of a foundation for an RBAC based approach to security management. 7his paper presents an overview of the RBAC salient issues that have been sur&ced by initial efsoorts. i%is paper also highlights some of challenges faced in migratian from an existing environment that has been developed over time and is largely segmented in both user communities and support groups to a centralized RBAC environment.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117205632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a UML based approach to role engineering","authors":"P. Epstein, R. Sandhu","doi":"10.1145/319171.319184","DOIUrl":"https://doi.org/10.1145/319171.319184","url":null,"abstract":"Role based access control (RBAC) is a promising technology for scalable access control. For RBAC to rise to its full potential, the roles must be properly constructed to reflect organizational access control policy and needs. This requires a discipline of Role Engineering to develop various components of RBAC such as role hierarchy, permissions (and permissionrole assignment), and constraints. The importance of Role Engineering has been recognized but very little work has been done to date. In this paper we explore the possibility of using the Unified Modeling Language (UML) to support Role Engineering. We chose UML because it is a de facto standard and refIects a consensus in the modeling community. To investigate the capability of UML for Role Engineering, we represent an existing Role framework recently published by Thomsen, O’Brien, and Bogle. This framework can be modeled in UML, with the assistance of adding a new user defined UML vocabulary.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131179785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RBAC in UNIX administration","authors":"Glenn Faden","doi":"10.1145/319171.319180","DOIUrl":"https://doi.org/10.1145/319171.319180","url":null,"abstract":"This paper describes an implementation of RBAC for UNIX systems in which roles are used as an alternative to the traditional supermel: Roles are special shared accounts which must be formally assumed by authorized users. Each role has a full set of credentials so that it can be authenticated and authorized by existing administrative services. Rather than providing for hierarchical roles, the permissions associated with roles are expressed hierarchically using execution profiles. Extensible attributes for users, roles, and permissions are maintained in distributed databases which can support multiple security policies simultaneously.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128014740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Role-based access control on the Web using Java","authors":"Luigi Giuri","doi":"10.1145/319171.319173","DOIUrl":"https://doi.org/10.1145/319171.319173","url":null,"abstract":"This paper describes a new extension of the security features provided by the Java platform. This extension provides complex role-based access control mechanisms that take advantage of a new Java security service designed to enforce access controls based on who runs the code. This extension will be utilized to define a new architecture that allows the design and implementation of role-based security policies for Web applications. using server-side Java technologies.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125765780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Napoleon: network application policy environment","authors":"D. Thomsen, R. O'Brien, C. Payne","doi":"10.1145/319171.319185","DOIUrl":"https://doi.org/10.1145/319171.319185","url":null,"abstract":"Napoleon consists of three parts; a model for specifying security policies for a heterogeneous set of network resources: a graphical tool for manipulating the model and software to translate the policy to target security mechanisms. This paper focuses on how the layered policy approach in the Napoleon model has been generalized to allow for adding additional layers. For the Napoleon tool a new approach for manipulating the role hierarchy is discussed.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132621154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for implementing role-based access control using CORBA security service","authors":"K. Beznosov, Yi Deng","doi":"10.1145/319171.319174","DOIUrl":"https://doi.org/10.1145/319171.319174","url":null,"abstract":"The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A con guration of CORBA protection system is de ned. We provide de nitions of RBAC0 and RBAC1 implementations in the framework of CORBA Security and describe what is required from an implementation of CORBA Security service in order to support RBAC0RBAC3 models.","PeriodicalId":355233,"journal":{"name":"ACM Workshop on Role-Based Access Control","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128743451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}