5 CONCLUSIONS AND FUTURE
WORK
We proposed a new access control model, C2RBAC,
based on CRBAC with a mechanism of context-aware
control. To realize secure, flexible, and scalable
access control for dynamic environments, C2RBAC
provides context-aware capability management, such
as restricting delegation range, while maintaining
the flexibility and scalability of CRBAC. Similar to
CRBAC, we described model families C2RBAC1,
C2RBAC2, and C2RBAC3. In addition, we demon-
strated the effectiveness of C2RBAC by comparing it
with other models and using an example of collabora-
tive development.
For future work, we will define protocols of
context-aware capability management to feasibly im-
plement C2RBAC and develop a formal method for
security verification. In particular, we are interested
in a method for detecting unintended capability prop-
agation by searching all possible delegation processes
using a model checking approach. We are also inter-
ested in implementing a prototype of C2RBAC.
ACKNOWLEDGMENTS
We would like to thank the anonymous reviewers
whose comments/suggestions helped improve this
manuscript.
REFERENCES
Al-Kahtani, M. A. and Sandhu, R. (2002). A model for
attribute-based user-role assignment. In 18th Annual
Computer Security Applications Conference, 2002.
Proceedings., pages 353–362. IEEE.
Baldauf, M., Dustdar, S., and Rosenberg, F. (2007). A sur-
vey on context-aware systems. International Journal
of Ad Hoc and Ubiquitous Computing, 2(4):263–277.
Covington, M. J., Long, W., Srinivasan, S., Dev, A. K.,
Ahamad, M., and Abowd, G. D. (2001). Securing
context-aware applications using environment roles.
In Proceedings of the sixth ACM symposium on Ac-
cess control models and technologies, pages 10–20.
Hasebe, K. and Mabuchi, M. (2010). Capability-role-based
delegation in workflow systems. In IEEE/IFIP 8th In-
ternational Conference on Embedded and Ubiquitous
Computing, EUC 2010, Hong Kong, China, 11-13 De-
cember 2010, pages 711–717. IEEE Computer Soci-
ety.
Hasebe, K., Mabuchi, M., and Matsushita, A. (2010).
Capability-based delegation model in rbac. In Pro-
ceedings of the 15th ACM symposium on Access con-
trol models and technologies, pages 109–118.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A unified
attribute-based access control model covering dac,
mac and rbac. In IFIP Annual Conference on Data
and Applications Security and Privacy, pages 41–55.
Springer.
Kulkarni, D. and Tripathi, A. (2008). Context-aware role-
based access control in pervasive computing systems.
In Proceedings of the 13th ACM symposium on Access
control models and technologies, pages 113–122.
Levy, H. M. (1984). Capability-Based Computer Systems.
Butterworth-Heinemann, USA.
Park, S.-H., Han, Y.-J., and Chung, T.-M. (2006). Context-
role based access control for context-aware applica-
tion. In International Conference on High Perfor-
mance Computing and Communications, pages 572–
580. Springer.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman,
C. E. (1996). Role-based access control models. Com-
puter, 29(2):38–47.
Schefer-Wenzl, S. and Strembeck, M. (2013). Modelling
context-aware rbac models for mobile business pro-
cesses. International Journal of Wireless and Mobile
Computing 3, 6(5):448–462.
Snyder, L. (1981). Formal models of capability-
based protection systems. IEEE Trans. Comput.,
30(3):172–181.
Strembeck, M. and Mendling, J. (2011). Modeling Process-
related RBAC Models with Extended UML Activ-
ity Models. Information and Software Technology,
53(5):456–483.
Zhang, X., Oh, S., and Sandhu, R. S. (2003). PBDM: a
flexible delegation model in RBAC. In Ferrari, E.
and Ferraiolo, D. F., editors, 8th ACM Symposium on
Access Control Models and Technologies, SACMAT
2003, Villa Gallia, Como, Italy, June 2-3, 2003, Pro-
ceedings, pages 149–157. ACM.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
826