Comparative Analysis of Existing Access Control Models in Systems with Interchangeable Objects

  • С.А. Лапин Altai State University (Barnaul, Russia) Email: apinsa567@gmail.com
Keywords: computer security, mathematical security models, access control, dynamic systems, tasks, HRU, RBAC, TBAC, DEBAC, requirements

Abstract

The paper examines usage peculiarities of existing access control models in systems with interchangeable objects. Interchangeable objects are understood to be objects that have the same functionality but different characteristics. Such systems can be focused on performing of a set of tasks with certain specific requirements for each of tasks. A health care institution is an example of such system, where each subject of the system is a doctor providing treatment services to patients and objects with the access that requires monitoring are drugs. In order to treat the same disease, a doctor can be provided with a variety of drugs that have the same functionality, but different characteristics. Both classic access control models (HRU, RBAC) and models meant for dynamic systems (TBAC, DEBAC) are discussed. The analysis is conducted in the context of access rights redundancy, differentiation in accordance with the tasks, as well as flexibility and complexity of the security policy administration. In terms of the performed analysis the necessity to create a new mathematical access control model suited for the examined systems is proved.

DOI 10.14258/izvasu(2016)1-25

Downloads

Download data is not yet available.

Author Biography

С.А. Лапин, Altai State University (Barnaul, Russia)
аспирант физико-технического факультета

References

Лапин С.А. Применение модели разграничения доступа D-TBAC в медицинском учреждении для контроля доступа к лекарственным препаратам // Новые информационные технологии и системы : cб. науч. ст. XII Междунар. науч.-тех. конф. — Пенза, 2015.

Harrison M., Ruzzo W., Ullman J. Protection in Operating Systems // Commun. ACM. — New York, 1976. — V. 19, № 8. DOI: 10.1145/ 360303.360333

Девянин П.Н. Модели безопасности компьютерных систем. Управление доступом и информационными потоками : учебное пособие для вузов. — М., 2013.

Sandhu R. Role-based Access Control // Advances in Computers. — 1998. — V. 46. DOI: 10.1016/S0065-2458(08)60206-5

Ferraiolo D., Sandhu R., Gavrila S., Kuhn R., Chandramouli R. Proposed NIST Standard for Role-based Access Control // ACM Trans. Inf. Syst. Secur. — 2001. — V. 4, № 3. DOI: 10.1145/501978.501980

Thomas R., Sandhu R. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management // Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects. — London, 1998.

Cvrˇcek D. Access Control in Workflow Systems // MOSIS’99 Proceedings. — Roˇznov pod Radhoˇstˇem, 1999.

Zhang C., Hu Y., Zhang G. Task-Role Based Dual System Access Control Model // International Journal of Computer Science and Network Security — 2006. — V. 7, № 6.

Лепешкин О.М., Харечкин П.В. Функционально-ролевая модель управления доступом в социотехнических системах // Известия Южного федерального университета. Технические науки. — 2009. — Т. 100, № 11.

Bertolissi C., Fern´andez M., Barker S. Dynamic Event-Based Access Control as Term Rewriting // Proceedings of the 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security. — California, 2007. DOI: 10.1007/978-3-540-73538-0_15

Lapin S. Access control model D-TBAC subject to the requirements to tasks’ performing // Proceedings of the 8th International Conference on Security of Information and Networks. — New York, 2015. DOI: 10.1145/2799979.2800034

How to Cite
Лапин С. Comparative Analysis of Existing Access Control Models in Systems with Interchangeable Objects // Izvestiya of Altai State University, 1, № 1(89) DOI: 10.14258/izvasu(2016)1-25. URL: https://izvestiya.asu.ru/article/view/%282016%291-25.