Organization Based Access Control Model
Organization Based Access Control Model
Toulouse.
based on first-order logic that will be used to spec-
§ Irit-CNRS, Institut de recherche en Informatique de ify an ORBAC security policy. Section 6 develops an
Toulouse, Université Paul Sabatier, 118 route de Narbonne, example of security policy in this language. Section
31062 Toulouse Cedex 4. 7 shows how to specify various constraints. Finally
¶ Laas-CNRS, Laboratoire d’analyse et d’architecture des
0,n 0,n
Organization Organization
on the fact that our model considers a ternary relation us remark again that Consider is a ternary relation
between organizations, objects and views. Our aim is between organizations, actions and activities. What
to make ourselves able to characterize organizations we have in mind is to be able to characterize organi-
that give different definitions to the same view. Take zations that differently structure the same activities.
the case of the view “medical record” defined in Pur- We should consider, for instance, that activity “con-
pan hospital as a set of Word documents and defined sulting” corresponds, in Purpan hospital, to an action
in Rangueil hospital as a set of Latex documents: “read” that can be ran on data files whereas it corre-
• U se(P urpan, F 31.doc, medical−record): “the sponds, in Rangueil hospital, to action “select” that
Purpan hospital uses F31.doc as a medical can be performed on relational databases:
record” and • Consider(P urpan, read, consulting): “the Pur-
• U se(Rangueil, F 32.tex, medical−record): “the pan hospital considers read as a consulting” and
Rangueil hospital uses F32.tex as a medical • Consider(Rangueil, select, consulting): “the
record”. Rangueil hospital considers select as a consult-
ing”.
4.4 Actions and activities
Security policies specify the authorized accesses to in- 4.5 Security policy (first definition)
active entities by active entities and regulate the ac-
Using the entities and the relationships introduced
tions carried out in the system. In our model, the
in the previous sections, we are now in a posi-
entity Action will mainly contain computer actions
tion to define security policies applying to such or
such as “read”, “write”, “send”, etc. Following the
such organization. A security policy specifies the
line of reasoning suggested in sections 4.2 and 4.3
authorized accesses of a system through a set of
where subjects and objects were abstracted by means
permissions, prohibitions, obligations and recom-
of roles and views, a new entity will also be used
mendations. In the following discussion, we consider
to abstract actions: the entity Activity. Seeing that
only the concept of permission, given that similar
roles associate subjects that fulfil the same functions
arguments can be developed regarding the concepts of
and views correspond to sets of objects that satisfy
prohibition, obligation and recommendation. What
a common property, activities will join actions that
we have in mind is to extend our model with a
partake of the same principles. In our model, ac-
relationship P ermission for the purpose of being
tivities like “reading”, “writing”, “consulting”, etc,
able to join together organizations, roles, views and
will be of the utmost interest. Since different or-
activities. More precisely, if org is an organization,
ganizations may decide that one and the same ac-
r is a role, v is a view and a is an activity, then
tion comes under distinct activities, the relationship
P ermission(org, r, v, a) means that organization org Action
grants role r permission to perform activity a on view
v. For example, take the case of Purpan hospital
granting role “medical secretary” permission to
perform activity “creation” on view “administrative 0,n
Recommendation
0,n 0,n
0,n 0,n
0,n 0,n
0,n 0,n
0,n Subject Is_permitted Object
0,n 0,n
0,n 0,n 0,n
Is_prohibited 0,n
0,n
0,n 0,n
Activity Is_obliged
0,n
Is_recommended
0,n 0,n
0,n
Recommendation
0,n
• how this organization is employing subject, this [2] D. E. Bell and L. J. LaPadula, “Secure computer
is modelled through the concept Role, systems: Unified exposition and multics interpre-
tation,” Tech. Rep. ESD-TR-73-306, The MITRE
• how this organization is using objects, this is Corporation, March 1976.
modelled through the concept V iew,
[3] K. J. Biba, “Integrity consideration for secure
• how this organization is performing actions, this computer systems,” Tech. Rep. MTR-3153, The
is modelled through the concept Activity and MITRE Corporation, June 1975.
[4] D. F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Access Control in Electronic Commerce Ap-
Kuhn, and R. Chandramouli, “Proposed NIST plications,” in 32nd Annual Hawaii Interna-
Standard for Role-Based Access Control,” ACM tional Conference on System Sciences (HICSS-
Transactions on Information and System Secu- 32), Maui, Hawaii, January 5–8 1999.
rity, vol. 4, no. 3, pp. 222–274, August 2001.
[14] E. Bertino, P.A. Bonatti, and E. Ferrari, “TBAC:
[5] S. I. Gavrila and J. F. Barkley, “Formal Specifica- A Temporal Role-Based Access Control for the
tion for Role Based Access Control User/Role and world wide web,” in Fifth ACM Workshop
Role/Role Relationship Management,” in Third on Role-Based Access Control, Berlin, Germany,
ACM Workshop on Role-Based Access Control, July 2000.
october 22–23 1996, pp. 81–90.
[15] J.B.D. Joshi, E. Bertino, and A. Ghafoor, “Tem-
[6] R. Sandhu, E. J. Coyne, H. L. Feinstein, and poral Hierarchies and Inheritance Semantics for
C.E. Youman, “Role-based access control mod- GTRBAC,” in Seventh ACM Symposium on Ac-
els,” IEEE Computer, vol. 29, no. 2, pp. 38–47, cess Control Models and Technologies (SACMAT
1996. 02), Monterey, California, USA, June 2002.
[7] R. Thomas and R. Sandhu, “Task-based Autho- [16] R. Viviani, “A Type/Domain Security Policy for
rization Controls (TBAC): A Family of Models Internet Trasmission Sharing and Archiving of
for Active and Enterprise-oriented Authorization Medical and Biological Data,” in International
Management,” in 11 th IFIP Working Confer- Workshop, Policies for Distriuted Systems and
ence on Database Security, Lake Tahoe, Califor- Networks (Policy 01), Bristol, UK, January 2001.
nia, USA, 1997. [17] E. Kohen, R. K. Thomas, W. Winsborough, and
[8] Roshan K. Thomas, “TMAC: A primitive for D. Shands, “Models for Coalition-Based Ac-
Applying RBAC in collaborative environment,” cess Control (CBAC),” in Seventh ACM Sympo-
in 2nd ACM, Workshop on RBAC, FairFax, Vir- sium on Access Control Models and Technologies
ginia, USA, November 6–7 1997, pp. 13–19. (SACMAT 02), Monterey, California, USA, June
2002.
[9] C. Bettini, S. Jajodia, X. S. Wang, and D. Wije-
[18] E. Bertino, S. Jajodia, and P. Samarati, “Sup-
sekera, “Obligation Monitoring in Policy Man-
porting Multiple Access Control Policies in
agement,” in International Workshop, Poli-
Database Systems,” in IEEE Symposium on Se-
cies for Distributed Systems and Neworks (Policy
curity and Privacy, Oakland, USA, 1996.
2002), Monterey CA, June 5–7 2002.
[19] G. Dinolt, L. Benzinger, and M. Yatabe, “Com-
[10] N. Damianou, N. Dulay, E. Lupu, and M. Sloman, bining Components and Policies,” in Proc. of the
“The Ponder Policy Specification Language,” in
Computer Security Foundations Workshop VII,
International Workshop, Policies for Distributed
Franconia, USA, 1994.
Systems and Neworks (Policy 2001), Bristol, UK,
2001, pp. January 29–31. [20] F. Cuppens, L. Cholvy, C. Saurel, and J. Carrère,
“Merging Regulations: analysis of a practical ex-
[11] M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, ample,” International Journal of Intelligent Sys-
“Protection in Operating Systems,” Communi- tems, vol. 16, no. 11, November 2001.
cation of the ACM, vol. 19, no. 8, pp. 461–471,
August 1976. [21] S. Benferhat, R. El Baida, and F. Cuppens,
“Modlisation des politiques de scurit dans le
[12] J. Barkley, K. Beznosoz, and J. Uppal, “Sup- cadre de la thorie des possibilits,” in Rencontres
porting Relationships in Access Control Usiong Francophones de la Logique Floue et ses Applica-
Role Based Access Control,” in Proceeding for tions, Montpellier, France, October 2002.
the ACM workshop on RBAC, Fairfax, Virginia,
USA, October 28–29 1999. [22] Ravi Sandhu, Bhamidipati, and Qamar Mu-
nawer, “The ARBAC97 Model for Role-Based
[13] E. C. Cheng, “An Object-Oriented Organiza- Administration of Roles,” ACM Transactions on
tional Model to Support Dynamic Role-based Information and System Security, vol. 2, no. 1,
February 1999.