Role usage and activation hierarchies best viewed in slide show mode
Download
1 / 14

Role Usage and Activation Hierarchies (best viewed in slide show mode) - PowerPoint PPT Presentation


  • 125 Views
  • Uploaded on

Role Usage and Activation Hierarchies (best viewed in slide show mode). Ravi Sandhu Laboratory for Information Security Technology George Mason University www.list.gmu.edu [email protected] Reference.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Role Usage and Activation Hierarchies (best viewed in slide show mode)' - wood


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Role usage and activation hierarchies best viewed in slide show mode

Role Usage and Activation Hierarchies(best viewed in slide show mode)

Ravi Sandhu

Laboratory for Information Security Technology

George Mason University

www.list.gmu.edu

[email protected]


Reference
Reference

  • Ravi Sandhu, “Role Hierarchies and Constraints for Lattice-Based Access Controls.” Proc. Fourth European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, pages 65-79. Published as Lecture Notes in Computer Science, Computer Security-ESORICS96 (Elisa Bertino et al, editors), Springer-Verlag, 1996.

  • Ravi Sandhu, “Role Activation Hierarchies.” Proc. Third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, October 22-23, 1998, pages 33-40.

  • Sylvia Osborn, Ravi Sandhu and Qamar Munawer. “Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies.” ACM Transactions on Information and System Security, Volume 3, Number 2, May 2000, pages 85-106.


Role hierarchies
Role hierarchies

  • Two aspects

    • Role usage: permission inheritance

    • Role activation: activation hierarchy

  • RBAC96 combines both aspects in a single hierarchy

  • ANSI/NIST standard model leaves this open

    • Do one or both, just make it clear what you are doing




Simple security property
Simple security property

  • some variations of LBAC use 2 labels for subjects

    • λr for read and λw for read

    • λr = λw for the single label case










ad