AC will verify that the assignment is valid. A valid
delegation must satisfy the following conditions:
1. The delegator is assigned to the role that is being
delegated.
2. The role is eligible for delegation.
3. The delegator trust level is greater or equal to the
delegationThreshold.
If the requested permission is listed in one of the valid
roles, than the permission is granted if the computed
delegatedTrust is greater or equals to the RPA trust
level.
5 CONCLUSIONS
The concept of Trust Aware role based access control
model was recognized in previous work. The chal-
lenge in this work was to preserve the strengths of the
well knownRBAC model as a role-centric access con-
trol. The model presented here shows a middle way in
that it provides a refined enough level of trust aware-
ness based on permissions, yet it is simple, enables
simplified auditing and can be easily understood and
enforced. In addition to the basic model, two exten-
sions were presented, one for Privacy purposes, the
other for Delegation purposes.
In future work we like to investigate the RPA com-
putation problem we described in section 3.7 further
and evaluate it under various simulation conditions.
We also plan to combine the model extensions and
test the model in a real-life scenario of a large com-
pany.
REFERENCES
Bayardo, R. J. and Agrawal, R. (2005). Data privacy
through optimal k-anonymization. In Data Engineer-
ing, 2005. ICDE 2005. Proceedings. 21st Interna-
tional Conference on, pages 217–228. IEEE.
Chakraborty, S. and Ray, I. (2006). Trustbac: integrating
trust relationships into the rbac model for access con-
trol in open systems. In Proceedings of the eleventh
ACM symposium on Access control models and tech-
nologies, pages 49–58. ACM.
Chen, L. and Crampton, J. (2011). Risk-aware role-based
access control. In Security and Trust Management -
7th International Workshop, STM 2011, Copenhagen,
Denmark, June 27-28, 2011, Revised Selected Papers,
pages 140–156.
Colombo, P. and Ferrari, E. (2014). Enforcement of pur-
pose based access control within relational database
management systems. IEEE Trans. Knowl. Data Eng.,
26(11):2703–2716.
Condori-Fern´andez, N., Franqueira, V. N., and Wieringa,
R. (2012). Report on the survey of role-based access
control (rbac) in practice.
Coyne, E. and Weil, T. R. (2013). Abac and rbac: Scal-
able, flexible, and auditable access management. IT
Professional, 15(3):14–16.
Crampton, J. and Khambhammettu, H. (2008). Delegation
in role-based access control. Int. J. Inf. Sec., 7(2):123–
136.
Deng, W. and Zhou, Z. (2012). A flexible rbac model based
on trust in open system. In Intelligent Systems (GCIS),
2012 Third Global Congress on, pages 400–404.
EmpowerID, w. p. (2013). Best practices in enterprise au-
thorization: The rbac/abac hybrid approach.
Ferraiolo, D. and Kuhn, R. (1992). Role-based access con-
trol. In In 15th NIST-NCSC National Computer Secu-
rity Conference, pages 554–563.
Jin, X., Krishnan, R., and Sandhu, R. (2012a). A role-based
administration model for attributes. In Proceedings of
the First International Workshop on Secure and Re-
silient Architectures and Systems, pages 7–12. ACM.
Jin, X., Krishnan, R., and Sandhu, R. S. (2012b). A
unified attribute-based access control model covering
dac, mac and rbac. DBSec, 12:41–55.
Kuhn, D. R., Coyne, E. J., and Weil, T. R. (2010). Adding
attributes to role-based access control. Computer,
43(6):79–81.
Rajpoot, Q. M., Jensen, C. D., and Krishnan, R. (2015).
Integrating attributes into role-based access control.
In Data and Applications Security and Privacy XXIX,
pages 242–249. Springer.
Ray, I. and Chakraborty, S. (2004). A vector model of
trust for developing trustworthy systems. In In Eu-
ropean Symposium on Research in Computer Security
, Sophia Antipolis (France, pages 260–275. Springer-
Verlag.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
Smari, W. W., Clemente, P., and Lalande, J. (2014). An
extended attribute based access control model with
trust and privacy: Application to a collaborative crisis
management system. Future Generation Comp. Syst.,
31:147–168.
Yang, N., Barringer, H., and Zhang, N. (2007). A purpose-
based access control model. In Proceedings of the
Third International Symposium on Information Assur-
ance and Security, IAS 2007, August 29-31, 2007,
Manchester, United Kingdom, pages 143–148.