Role based access control models

被引:2349
作者
Sandhu, RS
Coyne, EJ
Feinstein, HL
Youman, CE
机构
[1] Info. and Software Syst. Engineering, George Mason University, Fairfax, VA
[2] SETA Corporation, McLean, VA
[3] Rutgers University, NJ
[4] Georgetown University, Washington, DC
[5] American University, Washington, DC
[6] Case Institute of Technology, Cleveland, OH
[7] State University of New York, Potsdam, NY
[8] George Washington University, Washington, DC
[9] Vanderbilt University, Nashville, TN
[10] ISSE Department, MS 4A4, George Mason University, Fairfax
基金
美国国家科学基金会;
关键词
Number:; -; Acronym:; NSF; Sponsor: National Science Foundation; CCR-9503560; NIST; Sponsor: National Institute of Standards and Technology;
D O I
10.1109/2.485845
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Since the 1970s, computer systems have featured multiple applications and served multiple users, leading to heightened awareness of data security issues. System administrators and software developers focused on different kinds of access control to ensure that only authorized users were given access to certain data or resources. One kind of access control that emerged is role-based access control (RBAC). A role is chiefly a semantic construct forming the basis of access control policy. With RBAC, system administrators create roles according to the job functions performed in a company or organization, grant permissions (access authorization) to those roles, and then assign users to the roles on the basis of their specific job responsibilities and qualifications. A role can represent specific task competency, such as that of a physician or a pharmacist. Or it can embody the authority and responsibility of, say, a project supervisor. Roles define both the specific individuals allowed to access resources and the extent to which resources are accessed. For example, an operator role might access all computer resources but not change access permissions; a security officer role might change permissions but have no access to resources; and an auditor role might access only audit trails. Roles are used for system administration in such network operating systems as Novell's NetWare and Microsoft's Windows NT. This article explains why RBAC is receiving renewed attention as a method of security administration and review, describes a framework of four reference models the authors have developed to better understand RBAC and categorize different implementations, and discusses the use of RBAC to manage itself. The authors' framework separates the administration of RBAC from its access control functions.
引用
收藏
页码:38 / &
页数:11
相关论文
共 11 条
[1]  
FERNANDEZ EB, 1995, DATABASE SECURITY, V8
[2]  
Ferraiolo D.F., 1993, P NIST NCSC NAT US C, P107
[3]  
Ferraiolo D.F., 1992, 15 NATL COMPUTER SEC, P554
[4]  
HU MY, 1995, DATABASE SECURITY, V8, P333
[5]  
JONSCHER D, 1993, DATABASE SECURITY, V6, P91
[6]   DESIGN FOR DYNAMIC USER-ROLE-BASED SECURITY [J].
MOHAMMED, I ;
DILTS, DM .
COMPUTERS & SECURITY, 1994, 13 (08) :661-671
[7]  
NYANCHAMA M, 1994, DATABASE SECURITY, V8, P37
[8]   LATTICE-BASED ACCESS-CONTROL MODELS [J].
SANDHU, RS .
COMPUTER, 1993, 26 (11) :9-19
[9]  
THOMAS R, 1994, JUN P IEEE COMP SEC, V7, P66
[10]   THE MANAGEMENT OF COMPUTER SECURITY PROFILES USING A ROLE-ORIENTED APPROACH [J].
VONSOLMS, SH ;
VANDERMERWE, I .
COMPUTERS & SECURITY, 1994, 13 (08) :673-680