Integrated constraints and inheritance in DTAC

  • Authors:
  • Jonathon E. Tidswell;Trent Jaeger

  • Affiliations:
  • IBM T J Watson Research Center, Hawthorne, NY and School of Computer Science & Engineering, University of NSW, Sydney, Australia;IBM T J Watson Research Center, Hawthorne, NY

  • Venue:
  • RBAC '00 Proceedings of the fifth ACM workshop on Role-based access control
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Inheritance and constraints are two common techniques for safely managing the complexity of large access control configurations. Inheritance is used to help factor the model, while constraints are used to help ensure that the complexity will not result in an unsafe configuration arising in the future evolution of the system. In this paper we develop an integrated mathematical approach to defining both inheritance and constraints in the dynamically typed access control (DTAC) model. In the process we identify several useful relationships among DTAC objects. The combination of DTAC and our new relationships allow us to graphically construct a greater variety and complexity of efficiently verifiable separation of duty constraints than any other model we are aware of.