Role-Based Access Controls

by ; ;
Format: Hardcover
Pub. Date: 2003-04-01
Publisher(s): Artech House
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $85.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

eTextbook

We're Sorry
Not Available

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Role-based access control (RBAC) is a security mechanism that can greatly lower the cost and complexity of security administration for large networked applications. RBAC simplifies security administration by using roles, hierarchies, and constraints to organize privileges. This book explains these components of RBAC, as well as how to support and administer RBAC in a networked environment and how to integrate it with existing infrastructure.

Author Biography

David F. Ferraiolo is a supervisory computer scientist in the Computer Security Division at the National Institute of Standards and Technology (NIST), Gaithersburg, Maryland, with over 19 years of experience in the design D. Richard Kuhn is a computer scientist in the Computer Security Division of NIST, with 18 years of experience Ramaswamy Chandramouli is a computer scientist in the Computer Security Division of NIST. He has more than 17 years of experience

Table of Contents

Prefacep. xv
Acknowledgmentsp. xvii
Introductionp. 1
The purpose and fundamentals of access controlp. 2
Authorization versus authenticationp. 3
Users, subjects, objects, operations, and permissionsp. 4
Least privilegep. 5
A brief history of access controlp. 6
Access control in the mainframe erap. 6
Department of Defense standardsp. 8
Clark-Wilson modelp. 9
Origins of RBACp. 9
Comparing RBAC to DAC and MACp. 16
RBAC and the enterprisep. 18
Economics of RBACp. 18
Authorization management and resource provisioningp. 20
Referencesp. 23
Access Control Policy, Models, and Mechanisms--Concepts and Examplesp. 27
Policy, models, and mechanismsp. 27
Subjects and objectsp. 30
Reference monitor and security kernelp. 31
Completenessp. 33
Isolationp. 33
Verifiabilityp. 34
The reference monitor--necessary, but not sufficientp. 35
DAC policiesp. 35
Access control matrixp. 36
ACLs and capability listsp. 37
Protection bitsp. 38
MAC policies and modelsp. 39
Biba's integrity modelp. 41
Clark-Wilson modelp. 42
The Chinese wall policyp. 44
The Brewer-Nash modelp. 45
Domain-type enforcement modelp. 46
Referencesp. 48
Core RBAC Featuresp. 51
Roles versus ACL groupsp. 53
Core RBACp. 55
Administrative supportp. 55
Permissionsp. 56
Role activationp. 58
Mapping the enterprise view to the system viewp. 59
Global users and roles and indirect role privilegesp. 62
Mapping permissions into privilegesp. 63
Role Hierarchiesp. 67
Building role hierarchies from flat rolesp. 68
Inheritance schemesp. 69
Direct privilege inheritancep. 69
Permission and user membership inheritancep. 70
User containment and indirect privilege inheritancep. 72
Hierarchy structures and inheritance formsp. 75
Connector rolesp. 76
Organization chart hierarchiesp. 79
Geographical regionsp. 81
Accounting for role typesp. 83
General and limited role hierarchiesp. 84
Accounting for the Stanford modelp. 87
Referencesp. 89
SoD and Constraints in RBAC Systemsp. 91
Types of SoDp. 94
Static SoDp. 94
Dynamic SoDp. 98
Operational SoDp. 99
History and object-based SoDp. 100
Using SoD in real systemsp. 101
SoD in role hierarchiesp. 102
Static and dynamic constraintsp. 103
Mutual exclusionp. 104
Effects of privilege assignmentp. 105
Assigning privileges to rolesp. 107
Assigning roles to usersp. 108
Temporal constraints in RBACp. 112
Need for temporal constraintsp. 112
Taxonomy of temporal constraintsp. 113
Associated requirements for supporting temporal constraintsp. 116
Referencesp. 117
RBAC, MAC, and DACp. 121
Enforcing DAC using RBACp. 122
Configuring RBAC for DACp. 123
DAC with grant-independent revocationp. 124
Additional considerations for grant-dependent revocationp. 125
Enforcing MAC on RBAC systemsp. 125
Configuring RBAC for MAC using static constraintsp. 126
Configuring RBAC for MAC using dynamic constraintsp. 127
Implementing RBAC on MLS systemsp. 130
Roles and privilege setsp. 132
Assignment of categories to privilege setsp. 133
Assignment of categories to rolesp. 134
Example of MLS to RBAC mappingp. 134
Running RBAC and MAC simultaneouslyp. 136
Referencesp. 138
NIST's Proposed RBAC Standardp. 141
Overviewp. 141
Functional specification packagesp. 142
The RBAC reference modelp. 144
Functional specification overviewp. 145
Functional specification for core RBACp. 146
Administrative functionsp. 146
Supporting system functionsp. 146
Review functionsp. 147
Functional specification for hierarchical RBACp. 147
Hierarchical administrative functionsp. 147
Supporting system functionsp. 149
Review functionsp. 149
Functional specification for SSD relationp. 150
Administrative functionsp. 150
Supporting system functionsp. 151
Review functionsp. 151
Functional specification for a DSD relationp. 152
Administrative functionsp. 152
Supporting system functionsp. 152
Review functionsp. 153
Referencep. 153
Role-Based Administration of RBACp. 155
Background and terminologyp. 155
URA02 and PRA02p. 158
Crampton-Loizou administrative modelp. 162
Flexibility of administrative scopep. 163
Decentralization and autonomyp. 164
A family of models for hierarchical administrationp. 164
Role control centerp. 169
Inheritance and the role graphp. 170
Constraintsp. 172
Role viewsp. 172
Delegation of administrative permissionsp. 173
Decentralization and autonomyp. 176
Referencesp. 178
Enterprise Access Control Frameworks Using RBAC and XML Technologiesp. 179
Conceptual view of EAFsp. 179
Enterprise Access Central Model Requirementsp. 182
EAM's multiple-policy support requirementp. 183
EAM's ease of administration requirementp. 183
EAM specification and XML schemasp. 184
Specification of the ERBAC model in the XML schemap. 186
XML schema specifications for ERBAC model elementsp. 187
XML schema specifications for ERBAC model relationsp. 190
Encoding of enterprise access control data in XMLp. 193
Verification of the ERBAC model and data specificationsp. 197
Limitations of XML schemas for ERBAC model constraint representationp. 198
Using XML-encoded enterprise access control data for enterprisewide access control implementationp. 202
Conclusionp. 208
Referencesp. 208
Integrating RBAC with Enterprise IT Infrastructuresp. 211
RBAC for WFMSsp. 212
Workflow Concepts and WFMSsp. 212
WFMS components and access control requirementsp. 213
Access control design requirementsp. 214
RBAC model design and implementation requirements for WFMSsp. 216
RBAC for workflows--research prototypesp. 219
RBAC integration in Web environmentsp. 220
Implementing RBAC entirely on the Web serverp. 221
Implementing RBAC for Web server access using cookiesp. 222
RBAC on the Web using attribute certificatesp. 224
RBAC for UNIX environmentsp. 231
RBAC for UNIX administrationp. 231
RBAC implementation within the NFSp. 236
RBAC in Javap. 239
Evolution of Java security modelsp. 240
JDK 1.2 security model and enhancementp. 241
Incorporating RBAC into JDK 1.2 security model with JAASp. 244
RBAC for FDBSsp. 246
IRO-DB architecturep. 247
RBAC model implementation in IRO-DBp. 248
RBAC in autonomous security service modulesp. 249
Conclusionsp. 251
Referencesp. 251
Migrating to RBAC--Case Study: Multiline Insurance Companyp. 255
Backgroundp. 256
Benefits of using RBAC to manage extranet usersp. 256
Simplifying systems administration and maintenancep. 258
Enhancing organizational productivityp. 259
Benefits of using RBAC to manage employees (intranet users)p. 259
Reduction in new employee downtimep. 259
Simplified systems administration and maintenancep. 260
RBAC implementation costsp. 260
Software and hardware expensesp. 261
Systems administrators' labor expensesp. 261
Role engineering expensesp. 261
Time series of benefits and costsp. 262
Referencep. 264
RBAC Features in Commercial Productsp. 265
RBAC in relational DBMS productsp. 266
Informix Dynamic Server version 9.3 (IBM)p. 267
Oracle Enterprise Server version 8i (Oracle)p. 269
Sybase adaptive server version 12.5 (Sybase)p. 271
RBAC in enterprise security administration softwarep. 274
Control-SA (BMC software)p. 276
DirXmetaRole version 1.0 (Siemens)p. 280
SAM Jupiter (Systor)p. 284
Tivoli Identity Manager version 1.1 (IBM)p. 289
Conclusionsp. 292
Referencesp. 293
Appendix Ap. 295
Appendix Bp. 299
About the Authorsp. 303
Indexp. 305
Table of Contents provided by Ingram. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.