Enforcing security properties in task-Based systems

Keith Irwin*, Ting Yu, William H. Winsborough

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

Though a user's privileges are often granted based on the tasks that the user is expected to fulfill, the concept of tasks is usually not explicitly modeled in access control. We propose a system where tasks are the central concept that associates users to privileges. Ideally a user should be able to utilize these privileges and fulfill his tasks, but not to take harmful actions. To ensure this, a system often specifies a high-level security property to restrict the sequence of actions that a user can perform. In this paper, we propose a general model of access control in task-based system. This model considers the permissions a user as well as their temporal availability. Based on this model, we investigate the problem of enforcing security properties both statically (i.e., when tasks are assigned) and dynamically (i.e., when actions are performed). We study the complexity of static enforcement, and design efficient dynamic enforcement algorithms that avoiding unnecessary history tracking.

Original languageEnglish
Title of host publicationSACMAT'08 - Proceedings of the 13th ACM Symposium on Access Control Models and Technologies
Pages41-50
Number of pages10
DOIs
Publication statusPublished - 2008
Externally publishedYes
Event13th ACM Symposium on Access Control Models and Technologies, SACMAT'08 - Estes Park, CO, United States
Duration: 11 Jun 200813 Jun 2008

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

Conference

Conference13th ACM Symposium on Access Control Models and Technologies, SACMAT'08
Country/TerritoryUnited States
CityEstes Park, CO
Period11/06/0813/06/08

Keywords

  • Policy
  • Security properties
  • Task-based access control

Fingerprint

Dive into the research topics of 'Enforcing security properties in task-Based systems'. Together they form a unique fingerprint.

Cite this