
delegation based on a novel idea of a security risk ordering relation. The approach also
incorporates precise ways to consider other factors, such as functional requirements and
conflicts of interest, etc., essential for assuring the system integrity. The risk ordering
relation relies on a detailed assessment of the risks faced by the system. In the event
of lack of sufficient information, the approach enforces certain default interpretations
of risk in a conservative manner, so that any disagreement leads to a refinement of
the security risk analysis. A case study drawn from health care domain illustrates the
approach and demonstrates its effectiveness.
References
1. American National Standard for Information Technology. Role Based Access Control. Draft
BSR INCITS 359, April 2003.
2. Barka E. and Sandhu R. A Role-Based Delegation Model and Some Extensions. Proceedings
of the 23rd NIST-NCSC National Information Systems Security Conference, pp: 101–114,
Baltimore, USA, October, 2000.
3. Barka E. and Sandhu R. Framework for Role-Based Delegation Models. Proceedings of the
16th IEEE Annual Computer Security Applications Conference, pp: 168–175, New Orleans,
Louisiana, USA, December, 2000.
4. Dammag H. and Nissanke N. A Mathematical Framework for Safecharts. Proceedings of
the 5th International Conference of Formal Engineering Methods, pp: 620–640, Singapore,
Singapore, November, 2003.
5. Ferraiolo D. Cugini J., and Kuhn R. Role-Based Access Control (RBAC): Features and Mo-
tivations. Proceedings of the 11th Annual Computer Security Applications Conference, pp:
241–248, New Orleans, LA, USA, December, 1995.
6. Ferraiolo D., Sandhu R., Gavrila S., Kuhn R. and Chandramouli R. “Proposed NIST Standard
for Role-Based Access Control”. ACM Transactions on Information and System Security
(TISSEC), Vol. 4, No. 3, August 2001, pp: 224–474.
7. Khayat E. and Abdallah A. A Formal Model for Flat Role-Based Access Control. Proceedings
of the ACS/IEEE Conference on Computer Systems Applications, Tunis, Tunisia, July, 2003.
8. Na S. and Cheon S. Role Delegation in Role-Based Access Control. Proceedings of the 5th
ACM workshop on Role-Based Access Control, pp: 39–44, Berlin, Germany, June, 2000.
9. Sandhu R., Coyne E., Feinstein H. and Youman C. “Role-Based Access Control Models”.
IEEE Computer, Vol. 29, No. 2, November 1996, pp: 38–47.
10. Sandhu R., Ferraiolo D. and Kuhn R. The NIST Model for Role-Based Access Control:
Towards A Unified Standard. Proceedings of 5th ACM Workshop on Role-Based Access
Control, pp: 47–64, Berlin, Germany, July, 2000.
11. Zhang L., Ahn. G.J. and Chu B.T. “A Rule-Based Framework for Role-Based Delegation and
Revocation”. ACM Transactions on Information and System Security, Vol. 6, No. 3, August
2003, pp: 404–441.
12. Zhang L., Ahn. G.J. and Chu B.T. A Role-Based Delegation Framework for Healthcare
Information Systems. Proceedings of the 7th ACM symposium on Access Control Models
and Technologies, pp: 125–134, Monterey, California, USA, June, 2003.
13. Zhang X., Oh S. and Sandhu R. PBDM: A Flexible Delegation Model in RBAC. Proceed-
ings of the 8th ACM symposium on Access Control Models and Technologies, pp: 149–157,
Como, Italy, June, 2003.
341