skip to main content
article

A rule-based framework for role-based delegation and revocation

Authors Info & Claims
Published:01 August 2003Publication History
Skip Abstract Section

Abstract

Delegation is the process whereby an active entity in a distributed environment authorizes another entity to access resources. In today's distributed systems, a user often needs to act on another user's behalf with some subset of his/her rights. Most systems have attempted to resolve such delegation requirements with ad-hoc mechanisms by compromising existing disorganized policies or simply attaching additional components to their applications. Still, there is a strong need in the large, distributed systems for a mechanism that provides effective privilege delegation and revocation management. This paper describes a rule-based framework for role-based delegation and revocation. The basic idea behind a role-based delegation is that users themselves may delegate role authorities to others to carry out some functions authorized to the former. We present a role-based delegation model called RDM2000 (role-based delegation model 2000) supporting hierarchical roles and multistep delegation. Different approaches for delegation and revocation are explored. A rule-based language for specifying and enforcing policies on RDM2000 is proposed. We describe a proof-of-concept prototype implementation of RDM2000 to demonstrate the feasibility of the proposed framework and provide secure protocols for managing delegations. The prototype is a web-based application for law enforcement agencies allowing reliable delegation and revocation. The future directions are also discussed.

References

  1. Abadi, M., Burrows, M., Lampson, B., and Plotkin, G. 1993. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15, 4(Sept.), 706--734.]] Google ScholarGoogle Scholar
  2. Abiteboul, S. and Grumbach, S. 1991. A rule-based language with functions and sets. ACM Trans. Database Syst. 16, 1--30.]] Google ScholarGoogle Scholar
  3. Ahn, G. and Sandhu, R. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4, ACM (November) 207--226.]] Google ScholarGoogle Scholar
  4. Aura, T. 1999. Distributed access-rights management with delegation certificates. Security Internet programming. J. Vitec and C. Jensen Eds. Springer, Berlin, 211--235.]] Google ScholarGoogle Scholar
  5. Barka, E. and Sandhu, R. 2000. A role-based delegation model and some extensions. In Proceedings of 16th Annual Computer Security Application Conference, Sheraton New Orleans, December 11--15, 2000a.]] Google ScholarGoogle Scholar
  6. Barka, E. and Sandhu, R. 2000. Framework for role-based delegation model. In Proceedings of 23rd National Information Systems Security Conference, Baltimore, October 16--19, 2000b, 101--114.]]Google ScholarGoogle Scholar
  7. Bhamidipati, V. and Sandhu, R. 2000. Push Architectures for USER ROLE assignment. In Proceedings of 23rd National Information Systems Security Conference, Baltimore, October 16--19, 2000, 89--100.]]Google ScholarGoogle Scholar
  8. Blaze, M., Feigenbaum, J., and Lacy, J. 1996. Decentralized trust management. IEEE Symposium on Security and Privacy. Oakland, CA. May 1996.]] Google ScholarGoogle Scholar
  9. Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A. 1999. The role of trust management in distributed system security. Security Internet Programming. J. Vitec and C. Jensen, eds. Springer, Berlin, 185--210.]] Google ScholarGoogle Scholar
  10. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., and Ylonen, T. 1999. SPKI Certificate Theory, RFC2693, http://www.ietf.org/rfc/rfc2693.txt, 1999.]] Google ScholarGoogle Scholar
  11. Ferraiolo, D., Barkley, J., and Kuhn, D. R. 1999. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security 2, 1(February), 34--64.]] Google ScholarGoogle Scholar
  12. Ferraiolo, D., Cugini, J., and Kuhn, D. R. 1995. Role-based access control (RBAC): features and Motivations. In Proceedings of 11th Annual Computer Security Application Conference. New Orleans, LA, December 11--15 1995, 241--241.]]Google ScholarGoogle Scholar
  13. Forta, B. (ed), 1998. Nate Weiss. Advanced ColdFusion 4.0 Application Development. MacMillan Company.]] Google ScholarGoogle Scholar
  14. Forta, B. (ed). 2001. Certified ColdFusion Developer Study Guide. 1st edn. Macromedia Press.]] Google ScholarGoogle Scholar
  15. Gasser, M. and McDermott, E. 1990. An architecture for practical delegation a distributed system. IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, CA, May 7--9, 1990.]]Google ScholarGoogle Scholar
  16. Gladney, H. M. 1997. Access control for large collections. ACM Transactions on Information Systems 15, 2(April), 154--194.]] Google ScholarGoogle Scholar
  17. Hagstrom, A., Jajodia, S., Presicce, F. P., and Wijesekera, D. 2001. Revocations---a classification. In Proceedings of 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, 44--58.]] Google ScholarGoogle Scholar
  18. Hayton, R., Bacon, J., and Moody, K. 1998. OASIS: access control in an open, distributed environment. In Proceedings of 1998 IEEE Symposium on Security and Privacy. Oakland, CA, May 3--6. IEEE Computer Society Press, Los Alamitos, CA, 3--14.]]Google ScholarGoogle Scholar
  19. Jajodia, S., Samarati, P., and Subrahmanian, V. S. 1997. A Logical language for expressing authorizations. IEEE Symposium on Security and Privacy. May 1997.]] Google ScholarGoogle Scholar
  20. Lampson, B. W., Abadi, M., Burrows, M. L., and Wobber, E. 1992. Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems 10, 4, 265--310, November 1992.]] Google ScholarGoogle Scholar
  21. Li, N., Feigenbaum, J., and Grosof, B. N. 1999. A logic-based knowledge representation for authorization with delegation (extended abstract). In Proceeding 12th intl. IEEE Computer Security Foundations Workshop, (extended version is IBM Research Report RC 21492).]] Google ScholarGoogle Scholar
  22. Li, N. and Grosof, B. N. 2000. A practically implementation and tractable delegation logic. IEEE Symposium on Security and Privacy. May 2000.]] Google ScholarGoogle Scholar
  23. Liebrand, M., Ellis, H. J., Phillips, C., and Ting, T. C. 2002. Role delegation for a distributed, unified RBAC/MAC. In Proceedings of Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security King's College, University of Cambridge, UK July 29--31, 2002.]]Google ScholarGoogle Scholar
  24. Linn, J. and Nyström, M. 1999. Attribute certification: an enabling technology for delegation and role-based controls in distributed environments. ACM Workshop on Role-Based Access Control 121--130.]] Google ScholarGoogle Scholar
  25. McNamara, C. 1997. Basics of delegating. http://www.mapnp.org/library/guiding/delegate/basics.htm.]]Google ScholarGoogle Scholar
  26. Sandhu, R. 1997. Rational for the RBAC96 family of access control models. In Proceedings of 1st ACM Workshop on Role-based Access Control.]] Google ScholarGoogle Scholar
  27. Sandhu, R., Bhamidipati, V., and Munawer, O. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2, 1(February), 105--135.]] Google ScholarGoogle Scholar
  28. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. 1996. Role-based access control model. IEEE Computer 29, 2(February).]] Google ScholarGoogle Scholar
  29. Wielemaker, J. SWI-Prolog. http://www.swi.psy.uva.nl/projects/SWI-Prolog/]]Google ScholarGoogle Scholar
  30. Yao, W., Moody, K., and Bacon, J. 2001. A model of OASIS role-based access control and its support for active security. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT), Chantilly, VA, May 3--4, 2001, 171--181.]] Google ScholarGoogle Scholar
  31. Zhang, L., Ahn, G., and Chu, B. 2001. A Rule-based framework for role-based delegation. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, May 3--4, 2001 153--162.]] Google ScholarGoogle Scholar
  32. Zhang, L., Ahn, G., and Chu, B. 2002. A role-based delegation framework for healthcare information systems. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2002). Monterey, CA, June 3--4, 2002, 125--134.]] Google ScholarGoogle Scholar

Index Terms

  1. A rule-based framework for role-based delegation and revocation

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Information and System Security
        ACM Transactions on Information and System Security  Volume 6, Issue 3
        August 2003
        115 pages
        ISSN:1094-9224
        EISSN:1557-7406
        DOI:10.1145/937527
        Issue’s Table of Contents

        Copyright © 2003 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 August 2003
        Published in tissec Volume 6, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader