Analyzing and Developing Role-Based Access Control Models

Chen, Liang

(2011)

Chen, Liang (2011) Analyzing and Developing Role-Based Access Control Models.

Our Full Text Deposits

Full text access: Open

Full text file - 774.59 KB

Abstract

Role-based access control (RBAC) has become today's dominant access control model, and many of its theoretical and practical aspects are well understood. However, certain aspects of more advanced RBAC models, such as the relationship between permission usage and role activation and the interaction between inheritance and constraints, remain poorly understood. Moreover, the computational complexity of some important problems in RBAC remains unknown. In this thesis we consider these issues, develop new RBAC models and answer a number of these questions. We develop an extended RBAC model that proposes an alternative way to distinguish between activation and usage hierarchies. Our extended RBAC model has well-defined semantics, derived from a graph-based interpretation of RBAC state. Pervasive computing environments have created a requirement for access control systems in which authorization is dependent on spatio-temporal constraints. We develop a family of simple, expressive and flexible spatio-temporal RBAC models, and extend these models to include activation and usage hierarchies. Unlike existing work, our models address the interaction between spatio-temporal constraints and inheritance in RBAC, and are consistent and compatible with the ANSI RBAC standard. A number of interesting problems have been defined and studied in the context of RBAC recently. We explore some variations on the set cover problem and use these variations to establish the computational complexity of these problems. Most importantly, we prove that the minimal cover problem -- a generalization of the set cover problem -- is NP-hard. The minimal cover problem is then used to determine the complexity of the inter-domain role mapping problem and the user authorization query problem in RBAC. We also design a number of efficient heuristic algorithms to answer the minimal cover problem, and conduct experiments to evaluate the quality of these algorithms.

Information about this Version

This is a Approved version
This version's date is: 2011
This item is not peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/1de9694d-de0f-c437-5a35-82a813abdd1a/8/

Item TypeThesis (Doctorial)
TitleAnalyzing and Developing Role-Based Access Control Models
AuthorsChen, Liang
DepartmentsFaculty of Science\Mathematics

Identifiers

Deposited by Research Information System (atira) on 22-Jul-2014 in Royal Holloway Research Online.Last modified on 22-Jul-2014


Details