Role-based authorization constraints specification

  • Authors:
  • Gail-Joon Ahn;Ravi Sandhu

  • Affiliations:
  • Univ. of North Carolina at Charlotte, NC;George Mason Univ., Faifax, VA

  • Venue:
  • ACM Transactions on Information and System Security (TISSEC)
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Constraints are an important aspect of role-based access control (RBAC) and are often regarded as one of the principal motivations behind RBAC. Although the importance of contraints in RBAC has been recogni zed for a long time, they have not recieved much attention. In this article, we introduce an intuitive formal language for specifying role-based authorization constraints named RCL 2000 including its basic elements, syntax, and semantics. We give soundness and completeness proofs for RCL 2000 relative to a restricted form of first-order predicate logic. Also, we show how previously identified role-based authorization constraints such as separtation of duty (SOD) can be expressed in our language. Moreover, we show there are other significant SOD properties that have not been previously identified in the literature. Our work shows that there are many alternate formulations of even the simplest SOD properties, with varying degree of flexibility and assurance. Our language provides us a rigorous foundation for systematic study of role-based authorization constraints.