Policy CheckerPolicy Maker Policy Set π
Authorization
Enforcement
Data
Figure 1: Our access control system and our requirements in support to a policy maker.
egation history log (separated and not integrated in π
as we did here) to be able to return a permission p to
the original owner/delegator when it is revoked from
the delegatee by a third-party.
ACKNOWLEDGEMENT
We are grateful to several anonymous reviewers. In
different rounds of evaluation, their positive critics
helped us to improve our arguments and the relevance
of our contribution.
REFERENCES
Barka, E. and Sandhu, R. (2000). Framework for role-based
delegation models. In Proc. of 6th Ann. Conf. on
Computer Security Applications (ACSAC’00), pages
168–176.
Barka, E. and Sandhu, R. (2007). Framework for Agent-
based Role Delegation. In Proc. of the IEEE Int.
Conf. on Communications (ICC’07, pages 1361–1367
Becker, M. Y. (2005). A Formal Security Policy for an NHS
Electronic Health Record Service. Technical Report
UCAM-CL-TR-628, University of Cambridge.
Brucker, A. D. and Petritsch, H. (2009). Extending Access
Control Models with Break-glass. In Proc. of the 14th
ACM Symposium on Access Control Models and Tech-
nologies (SACMNAT ’09), pages 197–206. ACM.
Crampton, J. and Khambhammettu, H. (2008). Delegation
in role-based access control. Int. J. of Information Se-
curity, 7(1):123–136.
Crampton, J. and Morisset, C. (2011). An auto-delegation
mechanism for access control systems. In Proc. of Se-
curity and Trust Management (STM), volume 6710 of
LNCS, pages 1–16. Springer Berlin Heidelberg.
Ferreira, A., Chadwick, D., Farinha, P., Correia, R., Zao,
G., Chilro, R., and Antunes, L. (2009). How to Se-
curely Break into RBAC: The BTG-RBAC Model. In
Proc. of 5th Ann. Conf. on Computer Security Appli-
cations Conference (ACSAC’09), pages 23–31.
Ferreira, A., Cruz-Correia, R., Antunes, L., and Chadwick,
D. (2007). Access control: how can it improve pa-
tients’healthcare? In Medical and Care Compunetics,
volume 127 of Studies in Health Technology and In-
formatics, pages 65–76.
Ferreira, A., Cruz-Correia, R., Antunes, L., Farinha,
P., Oliveira-Palhares, E., Chadwick, D., and Costa-
Pereira, A. (2006). How to break access control in a
controlled manner. In Proc. of 19th IEEE Int. Symp. on
Computer-Based Medical Systems (CBMS), pages
847–854.
Hasebe, K. and Mabuchi, M. (2010). Capability-
role-based delegation in workflow systems. In
Proc. of IEEE/IFIP 8th Int. Conf. on Embedded and
Ubiquitous Computing (EUC 10), pages 711–717.
ISO/TS (2009). ISO/TS 13606-4: Health informatics - elec-
tronic health record communication - part 4: Security.
Krautsevich, L., Martinelli, F., Morisset, C., and Yaut-
siukhin, A. (2012). Risk-Based Auto-delegation for
Probabilistic Availability. In Data Privacy Manage-
ment and Autonomous Spontaneus Security, volume
7122 of LNCS, pages 206–220. Springer Berlin Hei-
delberg.
Li, M. and Wang, H. (2008). ABDM: An extended flex-
ible delegation model in RBAC. In Proc. of the 8th
Int. Conf. on Computer and Information Technology
(CIT 2008), pages 390–395.
Maw, H., Xiao, H., Christianson, B., and Malcolm, J.
(2014). An evaluation of break-the-glass access con-
trol model for medical data in wireless sensor net-
works. In Proc. of IEEE 16th Int. Conf. on e-Health
Networking, Applications and Services (Healthcom),
pages 130–135.
Rajesh, K. and Nayak, A. (2012). Modified BTG-RBAC
model for SaaS. In Cloud Computing Technologies,
Applications and Management (ICCCTAM), 2012 In-
ternational Conference on, pages 77–81.
Rissanen, E., Firozabadi, B., and Sergot, M. (2006). To-
wards a Mechanism for Discretionary Overriding of
Access Control. In Security Protocols, volume 3957
of LNCS, pages 312–319. Springer Berlin Heidelberg.
Rostad, L. and Edsberg, O. (2006). A study of access con-
trol requirements for healthcare systems based on au-
dit trails from access logs. In Proc. of the 22nd Annual
Computer Security Applications Conference (ACSAC
’06), pages 175–186.
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C.
(1996). Role-based access control models. Computer,
29(2):38–47.
Wainer, J. (2005). A fine-grained, controllable, user-to-
user delegation method in RBAC. In Proc. of 10th
ACM Symp. on Access Control Models and Technolo-
gies (SACMAT ’05), pages 59–66. ACM Press.
Wang, H. and Osborn, S. L. (2006). Delegation in the
role graph model. In Proc. of 11st ACM Symp. on
Access Control Models and Technologies (SACMAT
’06), pages 91–100. ACM.
Zhang, X., Oh, S., and Sandhu, R. (2003). PBDM: A Flex-
ible Delegation Model in RBAC. In Proc. of the 8th
ACM Symp. on Access Control Models and Technolo-
gies (SACMAT ’03), pages 149–157, New York, NY,
USA. ACM.
Zhao, G., Chadwick, D., and Otenko, S. (2007). Obligations
for Role Based Access Control. In Proc. of the 21st
Int. Conf. on Advanced Information Networking and
Applications Workshop (AINAW’07), volume 1, pages
424–431.