Budget-aware role based access control
Data(s) |
01/06/2013
|
---|---|
Resumo |
The suitability of Role Based Access Control (RBAC) is being challenged in dynamic environments like healthcare. In an RBAC system, a user's legitimate access may be denied if their need has not been anticipated by the security administrator at the time of policy specification. Alternatively, even when the policy is correctly specified an authorised user may accidentally or intentionally misuse the granted permission. The heart of the challenge is the intrinsic unpredictability of users' operational needs as well as their incentives to misuse permissions. In this paper we propose a novel Budget-aware Role Based Access Control (B-RBAC) model that extends RBAC with the explicit notion of budget and cost, where users are assigned a limited budget through which they pay for the cost of permissions they need. We propose a model where the value of resources are explicitly defined and an RBAC policy is used as a reference point to discriminate the price of access permissions, as opposed to representing hard and fast rules for making access decisions. This approach has several desirable properties. It enables users to acquire unassigned permissions if they deem them necessary. However, users misuse capability is always bounded by their allocated budget and is further adjustable through the discrimination of permission prices. Finally, it provides a uniform mechanism for the detection and prevention of misuses. |
Formato |
application/pdf |
Identificador | |
Publicador |
Elsevier Advanced Technology |
Relação |
http://eprints.qut.edu.au/55592/1/55592.pdf DOI:10.1016/j.cose.2012.11.002 Salim, Farzad, Reid, Jason F., Dulleck, Uwe, & Dawson, Edward (2013) Budget-aware role based access control. Computers & Security, 35, 37-50. |
Direitos |
Copyright 2012 Elsevier Ltd. NOTICE: this is the author’s version of a work that was accepted for publication in Computers & Security. Changes resulting from the publishing process, such as peer review, editing, corrections, structural formatting, and other quality control mechanisms may not be reflected in this document. Changes may have been made to this work since it was submitted for publication. A definitive version was subsequently published in Computers & Security, [Volume 35, (June 2013)] DOI: 10.1016/j.cose.2012.11.002 |
Fonte |
QUT Business School; Institute for Future Environments; Science & Engineering Faculty |
Palavras-Chave | #080202 Applied Discrete Mathematics #080303 Computer System Security #080605 Decision Support and Group Support Systems #Role based access control #Insider threat #Misaligned incentives #Price discrimination #Economics of Information security |
Tipo |
Journal Article |