Abstract
We show how a range of role-based access control (RBAC) models may be usefully represented as constraint logic programs, executable logical specifications. The RBAC models that we define extend the "standardμ RBAC models that are described by Sandhu et al., and enable security administrators to define a range of access policies that may include features, like denials of access and temporal authorizations, that are often useful in practice, but which are not widely supported in existing access control models. Representing access policies as constraint logic programs makes it possible to support certain policy options, constraint checks, and administrator queries that cannot be represented by using related methods (like logic programs). Representing an access control policy as a constraint logic program also enables access requests and constraint checks to be efficiently evaluated.
Original language | English |
---|---|
Pages (from-to) | 501-546 |
Number of pages | 46 |
Journal | ACM Transactions on Information and System Security |
Volume | 6 |
Issue number | 4 |
DOIs | |
Publication status | Published - 1 Nov 2003 |
Externally published | Yes |
Keywords
- Constraint logic programming
- Role-based access control