Security analysis of temporal RBAC under an administrative model

Abstract Security analysis of access control models is critical to confirm whether they ensure certain security properties. Administrative models specify the rules for state transition for any given access control model. While security analysis of role-based access control (RBAC) systems has been done using administrative models, work on security analysis of its temporal, spatial and spatio-temporal extensions has so far not considered the presence of any corresponding administrative model. In this paper, we present a methodology for performing security analysis of temporal RBAC (TRBAC) where state changes occur using the relations defined in a recently proposed administrative model named as AMTRAC (Administrative Model for Temporal Role-based Access Control). We initially define a number of security properties for TRBAC. These properties along with a representation of the TRBAC system and the administrative relations in AMTRAC are then formally specified using Alloy, a first order logic based language. Subsequently, validity of the specified properties is analyzed using the Alloy analyzer. We study the impact of the number of roles, users and temporal elements of TRBAC as well as various relations defined in AMTRAC on the time taken for security analysis.

[1]  Alessandro Armando,et al.  Efficient symbolic automated analysis of administrative attribute-based RBAC-policies , 2011, ASIACCS '11.

[2]  Shamik Sural,et al.  Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..

[3]  Yeping He,et al.  A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty , 2006, Inscrypt.

[4]  Ravi S. Sandhu The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[5]  Ravi Sandhu,et al.  A Role-Based Delegation Model and Some Extensions , 2000 .

[6]  Behzad Bordbar,et al.  Transformation of Spatio-Temporal Role Based Access Control Specification to Alloy , 2012, MEDI.

[7]  Elisa Bertino,et al.  X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control , 2005, TSEC.

[8]  Shamik Sural,et al.  STARBAC: Spatio temporal Role Based Access C ontrol , 2007, OTM Conferences.

[9]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..

[10]  Ravi S. Sandhu,et al.  Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.

[11]  Elisa Bertino,et al.  GEO-RBAC: a spatially aware RBAC , 2005, SACMAT '05.

[12]  Lawrence Snyder On the synthesis and analysis of protection systems , 1977, SOSP '77.

[13]  Wang Yi,et al.  Uppaal in a nutshell , 1997, International Journal on Software Tools for Technology Transfer.

[14]  Manachai Toahchoodee,et al.  Using alloy to analyse a spatio-temporal access control model supporting delegation , 2009, IET Inf. Secur..

[15]  Ravi S. Sandhu,et al.  The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.

[16]  Manachai Toahchoodee,et al.  A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.

[17]  Luigi V. Mancini,et al.  A graph-based formalism for RBAC , 2002, TSEC.

[18]  Ninghui Li,et al.  The Foundational Work of Harrison-Ruzzo-Ullman Revisited , 2013, IEEE Transactions on Dependable and Secure Computing.

[19]  Jeremy L. Jacob,et al.  The role-based access control system of a European bank: a case study and discussion , 2001, SACMAT '01.

[20]  C. R. Ramakrishnan,et al.  Efficient policy analysis for administrative role based access control , 2007, CCS '07.

[21]  Anna Lisa Ferrara,et al.  Policy Analysis for Self-administrated Role-Based Access Control , 2013, TACAS.

[22]  Andreas Schaad,et al.  A lightweight approach to specification and analysis of role-based access control extensions , 2002, SACMAT '02.

[23]  Xin Jin,et al.  A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.

[24]  Indrakshi Ray,et al.  LRBAC: A Location-Aware Role-Based Access Control Model , 2006, ICISS.

[25]  Jeffrey D. Ullman,et al.  On protection in operating systems , 1975, SOSP.

[26]  Vijayalakshmi Atluri,et al.  An Administrative Model for Spatio-Temporal Role Based Access Control , 2013, ICISS.

[27]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[28]  Vijayalakshmi Atluri,et al.  Towards formal security analysis of GTRBAC using timed automata , 2009, SACMAT '09.

[29]  Ravi S. Sandhu,et al.  The ARBAC99 model for administration of roles , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[30]  Ravi S. Sandhu,et al.  A model for role administration using organization structure , 2002, SACMAT '02.

[31]  Vijayalakshmi Atluri,et al.  AMTRAC: An administrative model for temporal role-based access control , 2013, Comput. Secur..

[32]  Manachai Toahchoodee,et al.  On the formalization and analysis of a spatio-temporal role-based access control model , 2011, J. Comput. Secur..

[33]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[34]  Sylvia L. Osborn Mandatory access control and role-based access control revisited , 1997, RBAC '97.

[35]  Vijayalakshmi Atluri,et al.  Analyzing temporal role based access control models , 2012, SACMAT '12.

[36]  Ninghui Li,et al.  Towards Formal Verification of Role-Based Access Control Policies , 2008, IEEE Transactions on Dependable and Secure Computing.

[37]  Martin C. Rinard,et al.  Automatic error finding in access-control policies , 2011, CCS '11.

[38]  Vijayalakshmi Atluri,et al.  Analysis of TRBAC with Dynamic Temporal Role Hierarchies , 2013, DBSec.

[39]  Kurt Jensen,et al.  Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Vol. 2, Analysis Methods , 1992 .

[40]  Indrakshi Ray,et al.  Using uml to visualize role-based access control constraints , 2004, SACMAT '04.

[41]  Shamik Sural,et al.  Security Analysis of Temporal-RBAC Using Timed Automata , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[42]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[43]  Ravi S. Sandhu,et al.  Safety analysis for the extended schematic protection model , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.