Budget-aware role based access control


Autoria(s): Salim, Farzad; Reid, Jason F.; Dulleck, Uwe; Dawson, Edward
Data(s)

01/06/2013

Resumo

The suitability of Role Based Access Control (RBAC) is being challenged in dynamic environments like healthcare. In an RBAC system, a user's legitimate access may be denied if their need has not been anticipated by the security administrator at the time of policy specification. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. The heart of the challenge is the intrinsic unpredictability of users' operational needs as well as their incentives to misuse permissions. In this paper we propose a novel Budget-aware Role Based Access Control (B-RBAC) model that extends RBAC with the explicit notion of budget and cost, where users are assigned a limited budget through which they pay for the cost of permissions they need. We propose a model where the value of resources are explicitly defined and an RBAC policy is used as a reference point to discriminate the price of access permissions, as opposed to representing hard and fast rules for making access decisions. This approach has several desirable properties. It enables users to acquire unassigned permissions if they deem them necessary. However, users misuse capability is always bounded by their allocated budget and is further adjustable through the discrimination of permission prices. Finally, it provides a uniform mechanism for the detection and prevention of misuses.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/55592/

Publicador

Elsevier Advanced Technology

Relação

http://eprints.qut.edu.au/55592/1/55592.pdf

DOI:10.1016/j.cose.2012.11.002

Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50.

Direitos

Copyright 2012 Elsevier Ltd.

NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Security, [Volume 35, (June 2013)] DOI: 10.1016/j.cose.2012.11.002

Fonte

QUT Business School; Institute for Future Environments; Science & Engineering Faculty

Palavras-Chave #080202 Applied Discrete Mathematics #080303 Computer System Security #080605 Decision Support and Group Support Systems #Role based access control #Insider threat #Misaligned incentives #Price discrimination #Economics of Information security
Tipo

Journal Article