Abstract
Access control is a security aspect whose requirements evolve with technology advances and, at the same time, contemporary social contexts. Multitudes of access control models grow out of their respective application domains such as healthcare and collaborative enterprises; and even then, further administering means, human factor considerations, and infringement management are required to effectively deploy the model in the particular usage environment. This paper presents a survey of access control mechanisms along with their deployment issues and solutions available today. We aim to give a comprehensive big picture as well as pragmatic deployment details to guide in understanding, setting up and enforcing access control in its real world application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Barker, S.: Action-status access control. In: SACMAT, pp. 195–204 (2007)
Brucker, A.D., Brügger, L., Kearney, P., Wolff, B.: An approach to modular and testable security models of real-world health-care applications. In: SACMAT, pp. 133–142 (2011)
Brucker, A.D., Petritsch, H.: Extending access control models with break-glass. In: SACMAT, pp. 197–206 (2009)
Brunel, J., Cuppens, F., Cuppens, N., Sans, T., Bodeveix, J.P.: Security policy compliance with violation management. In: FMSE, pp. 31–40 (2007)
Cheng, P.C., Rohatgi, P., Keser, C., Karger, P.A., Wagner, G.M., Reninger, A.S.: Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In: 2007 IEEE Symp. on Security and Privacy, pp. 222–230 (2007)
Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur. 10 (2007)
Ferraiolo, D.F., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 224–274 (2001)
Frank, M., Buhmann, J.M., Basin, D.: On the definition of role mining. In: SACMAT, pp. 35–44 (2010)
Fu, C., Li, A., Xu, L.: Hierarchical and dynamic security access control for collaborative design in virtual enterprise. In: IEEE ICIME, pp. 723–726 (2010)
Hu, H., Ahn, G.J., Kulkarni, K.: Anomaly discovery and resolution in web access control policies. In: SACMAT, pp. 165–174 (2011)
Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of access control systems. Tech. Rep. NIST Interagency Report 7316, NIST (September 2006)
Johnson, M.L., Bellovin, S.M., Reeder, R.W., Schechter, S.E.: Laissez-faire file sharing: access control designed for individuals at the endpoints. In: NSPW, pp. 1–10 (2009)
Ledru, Y., Qamar, N., Idani, A., Richier, J.L., Labiadh, M.A.: Validation of security policies by the animation of Z specifications. In: SACMAT, pp. 155–164 (2011)
Ma, J., Logrippo, L., Adi, K., Mankovski, S.: Risk analysis in access control systems based on trust theories. In: Proc. 2010 IEEE/WIC/ACM Int’l Conf. on Web Intelligence and Intelligent Agent Technology, vol. 3, pp. 415–418 (2010)
Marinovic, S., Craven, R., Ma, J., Dulay, N.: Rumpole: a flexible break-glass access control model. In: SACMAT, pp. 73–82 (2011)
Massacci, F.: Infringo ergo sum: when will software engineering support infringements? In: FoSER, pp. 233–238 (2010)
Molloy, I., Li, N., Li, T., Mao, Z., Wang, Q., Lobo, J.: Evaluating role mining algorithms. In: SACMAT, pp. 95–104 (2009)
Nguyen, N.D., Le, X.H., Zhung, Y., Lee, S., Lee, Y.K., Lee, H.: Enforcing access control using risk assessment. In: Proc. 4th European Conf. on Universal Multiservice Networks, pp. 419–424 (2007)
Ni, Q., Bertino, E.: xfACL: an extensible functional language for access control. In: SACMAT, pp. 61–72 (2011)
Ni, Q., Bertino, E., Lobo, J.: Risk-based access control systems built on fuzzy inferences. In: ASIACCS, pp. 250–260 (2010)
OASIS: eXtensible Access Control Markup Language (XACML) Version 3.0. Committee specification 01, OASIS (August 2010), http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf
Ouyang, K., Joshi, J.B.D.: CT-RBAC: A temporal RBAC model with conditional periodic time. In: IPCCC, pp. 467–474 (2007)
Park, J., Sandhu, R.S.: The UCON ABC usage control model. ACM Trans. Inf. Syst. Secur. 7, 128–174 (2004)
Rescorla, E., Lebovitz, G.: A survey of authentication mechanisms version 7. Internet-draft, Internet Engineering Task Force (February 2010), http://tools.ietf.org/search/draft-iab-auth-mech-07
Salim, F., Reid, J., Dawson, E.: An administrative model for UCON ABC . In: Proc. 8th Australasian Conf. on Information Security, vol. 105, pp. 32–38. Australian Computer Society, Inc., Darlinghurst (2010)
Salim, F., Reid, J., Dawson, E.: Authorization models for secure information sharing: A survey and research agenda. ISeCure, The ISC Int’l Journal of Information Security 2(2), 69–87 (2010)
Samarati, P., di Vimercati, S.d.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol. 2171, pp. 137–196. Springer, Heidelberg (2001)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38–47 (1996)
Sandhu, R.S., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine 32, 40–48 (1994)
Sinclair, S., Smith, S.W.: What’s wrong with access control in the real world? Security & Privacy 8(4), 74–77 (2010)
Tripunitara, M.V., Carbunar, B.: Efficient access enforcement in distributed role-based access control (RBAC) deployments. In: SACMAT, pp. 155–164 (2009)
Vaidya, J., Atluri, V., Warner, J., Guo, Q.: Role engineering via prioritized subset enumeration. IEEE Trans. Dependable and Secure Computing 7(3), 300–314 (2010)
Zhao, X., Johnson, M.E.: Access governance: Flexibility with escalation and audit. In: Proc. 43rd Hawaii Int’l Conf. on System Sciences, pp. 1–13 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Suhendra, V. (2011). A Survey on Access Control Deployment. In: Kim, Th., Adeli, H., Fang, Wc., Villalba, J.G., Arnett, K.P., Khan, M.K. (eds) Security Technology. SecTech 2011. Communications in Computer and Information Science, vol 259. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27189-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-27189-2_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27188-5
Online ISBN: 978-3-642-27189-2
eBook Packages: Computer ScienceComputer Science (R0)