PuRBAC: Purpose-Aware Role-Based Access Control

Several researches in recent years have pointed out that for the proper enforcement of privacy policies within enterprise data handling practices the privacy requirements should be captured in access control systems. In this paper, we extend the role-based access control (RBAC) model to capture privacy requirements of an organization. The proposed purpose-aware RBAC extension treats purpose as a central entity in RBAC. The model assigns permissions to roles based on purpose related to privacy policies. Furthermore, the use of purpose as a separate entity reduces the complexity of policy administration by avoiding complex rules and applying entity assignments, coherent with the idea followed by RBAC. Our model also supports conditions (constraints and obligations) with clear semantics for enforcement, and leverages hybrid hierarchies for roles and purposes for enforcing fine grained purpose and role based access control to ensure privacy protection.

[1]  H. P Gassmann,et al.  OECD guidelines governing the protection of privacy and transborder flows of personal data , 1981 .

[2]  Jorge Lobo,et al.  An obligation model bridging access control policies and privacy policies , 2008, SACMAT '08.

[3]  Elisa Bertino,et al.  Formal foundations for hybrid hierarchies in GTRBAC , 2008, TSEC.

[4]  Michael Waidner,et al.  Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data , 2002, Privacy Enhancing Technologies.

[5]  C. Powers Privacy Promises, Access Control, and Privacy Management , 2002 .

[6]  Joachim Biskup,et al.  Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.

[7]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[8]  Günter Karjoth,et al.  Translating privacy practices into privacy promises - how to promise what you can keep , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[9]  Michael Waidner,et al.  Privacy-enabled services for enterprises , 2002, Proceedings. 13th International Workshop on Database and Expert Systems Applications.

[10]  Matthias Schunter,et al.  Privacy promises, access control, and privacy management. Enforcing privacy throughout an enterprise by extending access control , 2002, Proceedings. Third International Symposium on Electronic Commerce,.

[11]  Marc Langheinrich,et al.  The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .

[12]  Elisa Bertino,et al.  A roadmap for comprehensive online privacy policy management , 2007, CACM.

[13]  Sushil Jajodia,et al.  Flexible support for multiple access control policies , 2001, TODS.

[14]  Sabrina De Capitani di Vimercati,et al.  Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.

[15]  Jorge Lobo,et al.  Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.

[16]  Paul Ashley,et al.  E-P3P privacy policies and privacy authorization , 2002, WPES '02.

[17]  Lorrie Faith Cranor,et al.  The platform for privacy preferences , 1999, CACM.

[18]  Günter Karjoth,et al.  A privacy policy model for enterprises , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[19]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[20]  Christos Faloutsos,et al.  Epidemic thresholds in real networks , 2008, TSEC.

[21]  Elisa Bertino,et al.  Hybrid role hierarchy for generalized temporal role based access control model , 2002, Proceedings 26th Annual International Computer Software and Applications.

[22]  Elisa Bertino,et al.  Purpose based access control of complex data for privacy protection , 2005, SACMAT '05.

[23]  Jorge Lobo,et al.  Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.

[24]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.