Research Article
A Formal Proximity Model for RBAC Systems
@INPROCEEDINGS{10.4108/icst.collaboratecom.2012.250453, author={Aditi Gupta and Michael Kirkpatrick and Elisa Bertino}, title={A Formal Proximity Model for RBAC Systems}, proceedings={8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing}, publisher={IEEE}, proceedings_a={COLLABORATECOM}, year={2012}, month={12}, keywords={access control security mobility context awareness}, doi={10.4108/icst.collaboratecom.2012.250453} }
- Aditi Gupta
Michael Kirkpatrick
Elisa Bertino
Year: 2012
A Formal Proximity Model for RBAC Systems
COLLABORATECOM
ICST
DOI: 10.4108/icst.collaboratecom.2012.250453
Abstract
To combat the threat of information leakage through pervasive access, researchers have proposed several extensions to the popular role-based access control (RBAC) model. Such extensions can incorporate contextual features, such as location, into the policy decision in an attempt to restrict access to trustworthy settings. In many cases, though, such extensions fail to reflect the true threat, which is the presence or absence of other users, rather than absolute locations. For instance, for location-aware separation of duty, it is more important to ensure that two people are in the same room, rather than in a designated, pre-defined location. Prox-RBAC was proposed as an extension to consider the relative proximity of other users with the help of a pervasive monitoring infrastructure. However, that work offered only an informal view of proximity, and unnecessarily restricted the domain to spatial concerns. In this work, we present a more rigorous definition of proximity based on formal topological relations. In addition, we show that this definition can be applied to several additional domains, such as social networks, communication channels, attributes, and time; thus, our policy model and language is more flexible and powerful than the previous work. In addition to proposing the model, we present a number of theoretical results for such systems, including a complexity analysis, templates for cryptographic protocols, and proofs of security features.