Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A formal proximity model for RBAC systems
Gupta A., Kirkpatrick M., Bertino E. Computers and Security41 52-67,2014.Type:Article
Date Reviewed: Aug 22 2014

Gupta et al. claim that role-based access control (RBAC) for the mobile and ubiquitous computing environment needs further constraints, such as a relative distance (proximity) of two roles, in allowing access to resources. For instance, a manager can access a special bank account only if there is a supervisor within 20 meters. This kind of proximity constraint (that is, relative distance between entities) is generalized to include geographical proximity, temporal proximity, social proximity, cyber proximity, and attribute proximity.

The formalization of a proximity model considers the proximity tuple that includes a role, feature types to measure the proximity, and proximity constraints. For instance, only a member of a dating social site who is in the same profession as me and is no more than ten years older than me can view my profile page. This is specified with 〈Member, {profession, age}, C1C2〉. The constraint C1 specifies the distance metric (that is, ten years older than me), and the constraint C2 specifies the same profession as me.

The paper also shows the enforcement architectures for the proposed formal proximity-based RBAC model. The challenges include feature gathering and efficiently activating the right roles for the user. The proximity features (location, temporal, social, cyber, and attribute) depend on the frequency and accuracy of these relative proximity feature data. The model not only has to authenticate the system user in the relevant features (for example, location, cyber session), but also keep track of the relevant features of another role (for example, senior role) and its contextual history. The model’s safety analysis focuses on the replay attacks and illegal access by external adversaries. I wonder if the attack scenarios are complete or not. There may be inherent and more challenging attacks related to the proximity access control model.

Reviewer:  Soon Ae Chun Review #: CR142645 (1411-0971)
Bookmark and Share
  Featured Reviewer  
 
Access Controls (D.4.6 ... )
 
 
Portable Devices (C.5.3 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Access Controls": Date
Access control lists in capability environments
Lopriore L. Technology and Science of Informatics 3(3): 163-174, 1984. Type: Article
Mar 1 1985
Some variants of the take-grant protection model
Biskup J. (ed) Information Processing Letters 19(3): 151-156, 1984. Type: Article
Jun 1 1985
On access checking in capability-based systems
Kain R., Landwehr C. (ed) IEEE Transactions on Software Engineering SE-13(2): 202-207, 1987. Type: Article
Dec 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy