Requirements of role-based access control for collaborative systems

Trent Ray Jaeger, Atul Prakash

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

In many collaborative systems, users can trigger the execution of commands in a process owned by another user. Unless the access rights of such processes are limited, any user in the collaboration can gain access to another's private files; execute applications on another user's behalf; or read public system files, such as the password file, on another user's machine. However, some applications require limited sharing of private files, so it may be desirable to grant access to these files for a specific purpose. Role-based access control (RBAC) models can be used to limit the access rights of processes, but current implementations do not enable users to flexibly control the access rights of a process at runtime. We define a discretionary access control model that enables principals to flexibly control the access rights of a collaborative process. We then specify the requirements of RBAC models necessary to implement this discretionary access control model.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM Workshop on Role-Based Access Control
PublisherACM
Pages53-64
Number of pages12
StatePublished - 1995
EventProceedings of the 1995 1st ACM Workshop on Role-Based Access Control - Gaithersburg, MD, USA
Duration: Nov 30 1995Dec 1 1995

Other

OtherProceedings of the 1995 1st ACM Workshop on Role-Based Access Control
CityGaithersburg, MD, USA
Period11/30/9512/1/95

Fingerprint

Access control

All Science Journal Classification (ASJC) codes

  • Computer Science(all)

Cite this

Jaeger, T. R., & Prakash, A. (1995). Requirements of role-based access control for collaborative systems. In Proceedings of the ACM Workshop on Role-Based Access Control (pp. 53-64). ACM.
Jaeger, Trent Ray ; Prakash, Atul. / Requirements of role-based access control for collaborative systems. Proceedings of the ACM Workshop on Role-Based Access Control. ACM, 1995. pp. 53-64
@inproceedings{79d5ea0a9b7e4a50bd97a13604801bda,
title = "Requirements of role-based access control for collaborative systems",
abstract = "In many collaborative systems, users can trigger the execution of commands in a process owned by another user. Unless the access rights of such processes are limited, any user in the collaboration can gain access to another's private files; execute applications on another user's behalf; or read public system files, such as the password file, on another user's machine. However, some applications require limited sharing of private files, so it may be desirable to grant access to these files for a specific purpose. Role-based access control (RBAC) models can be used to limit the access rights of processes, but current implementations do not enable users to flexibly control the access rights of a process at runtime. We define a discretionary access control model that enables principals to flexibly control the access rights of a collaborative process. We then specify the requirements of RBAC models necessary to implement this discretionary access control model.",
author = "Jaeger, {Trent Ray} and Atul Prakash",
year = "1995",
language = "English (US)",
pages = "53--64",
booktitle = "Proceedings of the ACM Workshop on Role-Based Access Control",
publisher = "ACM",

}

Jaeger, TR & Prakash, A 1995, Requirements of role-based access control for collaborative systems. in Proceedings of the ACM Workshop on Role-Based Access Control. ACM, pp. 53-64, Proceedings of the 1995 1st ACM Workshop on Role-Based Access Control, Gaithersburg, MD, USA, 11/30/95.

Requirements of role-based access control for collaborative systems. / Jaeger, Trent Ray; Prakash, Atul.

Proceedings of the ACM Workshop on Role-Based Access Control. ACM, 1995. p. 53-64.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Requirements of role-based access control for collaborative systems

AU - Jaeger, Trent Ray

AU - Prakash, Atul

PY - 1995

Y1 - 1995

N2 - In many collaborative systems, users can trigger the execution of commands in a process owned by another user. Unless the access rights of such processes are limited, any user in the collaboration can gain access to another's private files; execute applications on another user's behalf; or read public system files, such as the password file, on another user's machine. However, some applications require limited sharing of private files, so it may be desirable to grant access to these files for a specific purpose. Role-based access control (RBAC) models can be used to limit the access rights of processes, but current implementations do not enable users to flexibly control the access rights of a process at runtime. We define a discretionary access control model that enables principals to flexibly control the access rights of a collaborative process. We then specify the requirements of RBAC models necessary to implement this discretionary access control model.

AB - In many collaborative systems, users can trigger the execution of commands in a process owned by another user. Unless the access rights of such processes are limited, any user in the collaboration can gain access to another's private files; execute applications on another user's behalf; or read public system files, such as the password file, on another user's machine. However, some applications require limited sharing of private files, so it may be desirable to grant access to these files for a specific purpose. Role-based access control (RBAC) models can be used to limit the access rights of processes, but current implementations do not enable users to flexibly control the access rights of a process at runtime. We define a discretionary access control model that enables principals to flexibly control the access rights of a collaborative process. We then specify the requirements of RBAC models necessary to implement this discretionary access control model.

UR - http://www.scopus.com/inward/record.url?scp=0029426927&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0029426927&partnerID=8YFLogxK

M3 - Conference contribution

SP - 53

EP - 64

BT - Proceedings of the ACM Workshop on Role-Based Access Control

PB - ACM

ER -

Jaeger TR, Prakash A. Requirements of role-based access control for collaborative systems. In Proceedings of the ACM Workshop on Role-Based Access Control. ACM. 1995. p. 53-64