skip to main content
10.1145/775412.775414acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article

An administration concept for the enterprise role-based access control model

Published:02 June 2003Publication History

ABSTRACT

Using an underlying role-based model for the administration of roles has proved itself to be a successful approach. This paper sets out to describe the enterprise role-based access control model (ERBAC) in the context of SAM Jupiter, a commercial enterprise security management software.We provide an overview of the role-based conceptual model underlying SAM Jupiter. Having established this basis, we describe how the model is used to facilitate a role-based administration approach. In particular, we discuss our notion of 'scopes', which describe the objects over which an administrator has authority. The second part provides a case study based on our real-world experiences in the implementation of role-based administrative infrastructures. Finally, a critical evaluation and comparison with current approaches to administrative role-based access control is provided.

References

  1. M. A. Al-Kahtani and R. Sandhu. A Model for Attribute-Based User-Role Assignment. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 353--362, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security (TISSEC), 4(3):224--274, August 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. G. Karjoth. The Authorization Service of Tivoli Policy Director. In Proceedings of the 17th Annual Computer Security Applications Conference, New Orleans, Louisiana, USA, pages 319--328, December 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. A. Kern. Advanced Features for Enterprise-Wide Role-Based Access Control. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 333--342, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Kern, M. Kuhlmann, A. Schaad, and J. Moffett. Observations on the Role Life-Cycle in the Context of Enterprise Security Management. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey, California, USA, pages 43--51, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. A. D. Marshall. A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. In Proceedings of the 18th Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, pages 382--390, December 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Moffett. Specification of Management Policies and Discretionary Access Control. In M. Sloman, editor, Network and Distributed Systems Management, pages 455--480. Addison-Wesley, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Moffett. Control Principles and Role Hierarchies. In Proceedings of the Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, USA, pages 63--69, October 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Oh and R. Sandhu. A Model for Role Administration Using Organization Structure. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2002), Monterey, California, USA, pages 155--168, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. For more information about SAM Jupiter see http://www.sam-security.com.Google ScholarGoogle Scholar
  11. R. Sandhu and V. Bhamidipati. Role-Based Administration of User-Role Assignment: The URA97 Model and its Oracle Implementation. Journal of Network and Computer Applications, 22(3), July 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security (TISSEC), 2(1):105--135, February 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Sandhu and Q. Munawer. The ARBAC99 Model for Administration of Roles. In Proceedings of the 18th Annual Computer Security Applications Conference, Phoenix, Arizona, USA, pages 229--238, December 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38--47, February 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Schaad, J. Moffett, and J. Jacob. The Role-Based Access Control System of a European Bank: A Case Study and Discussion. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, pages 3--9, May 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. An administration concept for the enterprise role-based access control model

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader