our case study the compilation time related to our ac-
cess control model was just 3 seconds on a machine
with 4GB RAM and 2.3GHz CPU, to cover instances
of 93 unique objects throughout the application. Cor-
rectness and completeness approach in ΦRBAC gives
an insurance to the developer about the access control
of the system, so any security failure of the system
during its run-time is not related to its access control
element but to the other security elements of the sys-
tem such as data encryption.
ΦRBAC’s weakness is originated in the RBAC it-
self. RBAC does not support an ownership notion.
For instance, if in a research group we have a policy
that states that the supervisor can edit their students’
travel allowance, then any user with the role super-
visor can edit the travel allowance of any student in
the group regardless of who is the supervisor of those
students. In order to overcome this flaw, the devel-
oper needs to introduce a number of unnecessary roles
such as supervisorOfStudentA to enforce the men-
tioned policy. So ΦRBAC would be more efficient if
the developer uses the ownership notion as a policy
term as well.
5 CONCLUSIONS AND FUTURE
WORK
This paper introduced ΦRBAC, a fine-grained ac-
cess control model for the Web application domain
that enforces separation of concerns between appli-
cation and access control model at the right abstrac-
tion level. ΦRBAC is implemented as an extension
to a domain-specific language, WebDSL. Its genera-
tor architecture is divided into a testing phase and a
subsequent transformation phase. The testing phase
uses a fast novel mechanism to check the correctness
and completeness of the model and the application via
model-checking techniques. Furthermore, we showed
how dead authorization code could occur in a fine-
grained access control model, and how we checked
for this. We evaluated the approach and its mechanism
based on a real world example. The example demon-
strated the efficacy and benefits of ΦRBAC in terms
of defining a fine-grained access control model and
checking correctness, completeness and sufficiency.
Furthermore, it showed the applicability of ΦRBAC
model for large data based on a rich set of policies.
For future work we like to introduce the notion
of ownership (McCollum et al., 1990), as a policy
term, to improve the ΦRBAC model and its mecha-
nism. Also, we plan to integrate the other well-known
access control models into our access control model,
to achieve access control integration for a domain
of Web applications that are constructed from mixed
sources and require different access control models
for different parts of the application. Moreover, in
terms of the ΦRBAC architecture, we like to explore
the possibility of generating our access control predi-
cates on top of the database tier so that the application
can retrieve access control settings from the database
at run-time and take advantage of the database tier’s
security options. Furthermore, we will perform more
evaluation of ΦRBAC based a broader set of Web ap-
plications.
REFERENCES
Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., and
Debar, H. (2006). An extended RBAC profile of
XACML. SWS ’06, pp. 13–22, ACM.
Brittain, J. and Darwin, I. F. (2007). Tomcat: the definitive
guide, 2nd edition. O’Reilly.
Chen, K. and Huang, C.-M. (2005). A practical aspect
framework for enforcing fine-grained access control in
web applications. ISPEC ’05, LNCS 3439, pp. 156–
167.
Connor, A. and Loomis, R. (2010). Economic analysis of
role-based access control. Technical report, National
Institute of Standards and Technology.
Dalai, A. K. and Jena, S. K. (2011). Evaluation of web
application security risks and secure design patterns.
CCS ’11, pp. 565–568, ACM.
Damianou, N., Dulay, N., Lupu, E., and Sloman, M. (2001).
The ponder policy specification language. POLICY
2001, LNCS 1995, pp. 18–38. Springer.
de Moura, L. M. and Bjørner, N. (2008). Z3: An Efficient
SMT Solver. TACAS ’08, LNCS 5195, pp. 337–340.
Springer.
Ferraiolo, D. and Kuhn, R. (1992). Role-Based Access Con-
trol. NIST-NCSC ’92, pp. 554–563.
Ferraiolo, D. F., Barkley, J. F., and Kuhn, D. R. (1999). A
role-based access control model and reference imple-
mentation within a corporate intranet. ISS ’09, pp.
34–64, ACM.
Gofman, M. I., Luo, R., Solomon, A. C., Zhang, Y., Yang,
P., and Stoller, S. D. (2009). RBAC-PAT: A policy
analysis tool for role based access control. TACAS
’09, LNCS 5505, pp. 46–49.
Gorodetski, V. I., Skormin, V. A., and Popyack, L. J., edi-
tors (2001). Information Assurance in Computer Net-
works: Methods, Models, and Architectures for Net-
work Security, LNCS 2052.
Groenewegen, D. and Visser, E. (2009). Integration of data
validation and user interface concerns in a DSL for
web applications. SLE ’09, LNCS 5969, pp. 164-173.
Groenewegen, D. M., Hemel, Z., Kats, L. C. L., and Visser,
E. (2008). Webdsl: a domain-specific language for
dynamic web applications. OOPSLA ’08, pp. 779–
780. ACM.
ICSOFT2012-7thInternationalConferenceonSoftwareParadigmTrends
90