Abstract
Role-based access control eases the management of access control in cases where there are large numbers of objects and users. Roles provide certain access to specific data objects. In order to handle a very large number of users who each need the same access to slightly different data, we propose parameterized roles as an alternative to private roles. We motivate the requirement for parameterized roles, show how to define them, and show how with only very slight modifications, our role graph model can incorporate parameterized roles.
This research was supported by the Natural Sciences and Engineering Research Council of Canada.
Chapter PDF
Similar content being viewed by others
References
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM TISSEC, 4(3):224–275, 2001.
Cecilia M. Ionita and Sylvia L. Osborn. Privilege administration for the role graph model. In Research Directions in Data and Applications Security, Proc. IFIP WG11.3 Working Conference on Database Security, pages 15–25. Kluwer Academic Publishers, 2003.
M. Nyanchama. Commercial Integrity, Roles and Object Orientation. PhD thesis, Department of Computer Science, The University of Western Ontario, London, Canada, Sept. 1994.
M. Nyanchama and S. L. Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgenstern, and C. E. Landwehr, editors, Database Security, VIII, Status and Prospects WG11.3 Working Conference on Database Security, pages 37–56. North-Holland, 1994.
M. Nyanchama and S. L. Osborn. The role graph model and conflict of interest. ACM TISSEC, 2(l):3–33, 1999.
S. Osborn and Y. Guo. Modeling users in role-based access control In Fifth ACM Workshop on Role-Based Access Control, pages 31–38, Berlin, Germany, July 2000.
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM Trans Database Syst, 16(1):88–131, 1991.
R. Sandhu, V. Bhamidipati, and Q Munawer. The ARBAC97 model for role-based administration of roles. ACM Trans. on Information and Systems Security, 2(1):105–135, Feb. 1999.
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29:38–47, Feb. 1996.
Jingzhu Wang and Sylvia L. Osborn. A role-based approach to access control for XML databases. In Proc. ACM SACMAT, 2004.
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this paper
Cite this paper
Ge, M., Osborn, S.L. (2004). A Design for Parameterized Roles. In: Farkas, C., Samarati, P. (eds) Research Directions in Data and Applications Security XVIII. IFIP International Federation for Information Processing, vol 144. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8128-6_17
Download citation
DOI: https://doi.org/10.1007/1-4020-8128-6_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8127-9
Online ISBN: 978-1-4020-8128-6
eBook Packages: Springer Book Archive