Claims
- 1. In a lattice-based multi-level security system of the type wherein each object to which access is controlled by said lattice-based multi-level security system is assigned to a compartment and level maintained thereby, and wherein individual subjects are permitted access to specified objects protected by said security system only if the particular subject possesses a clearance level at least equal to that assigned to the object, and if the object is assigned to a compartment authorized for use by the subject, a method of implementing role-based access control, comprising the following steps:
- defining a collection of roles,
- mapping each defined role to a set of privileges, each privilege providing access to one or more combinations of compartments and levels within said lattice-based multi-level security system,
- assigning each subject to one or more of said roles, and
- at the time a subject requests access to an object,
- determining whether the subject is assigned to a role having privileges corresponding to the compartment and level of the requested object within said lattice-based multi-level security system, and
- employing said lattice-based multi-level security system to control access of the subject to the object in response to said determination.
- 2. The method of claim 1, wherein said step of determining whether the subject is assigned to a role having privileges corresponding to the compartment and level of the requested object within said lattice-based multi-level security system is performed by:
- (1) determining the compartment and level of the requested object within said lattice-based multi-level security system,
- (2) determining whether the subject belongs to a role mapped to a privilege providing access to the compartment and level of the requested object, and, if so,
- (3) assigning the subject access to objects having compartments and levels equal to those of the requested object.
- 3. The method of claim 1, comprising the further step of dividing the totality of compartments within said lattice-based multi-level security system into a first set of compartments that may be mapped to one or more of said collection of roles, and a second set of compartments that can not thus be mapped.
- 4. The method of claim 1, comprising the further step of dividing the totality of levels supported by said lattice-based multi-level security system into a first set of levels that may be mapped to one or more of said collection of roles, and a second set of levels that can not thus be mapped.
- 5. The method of claim 1, wherein as a new object is made available for access by said role-based access control method, said object is assigned to one or more compartments and levels within said lattice-based multi-level security system, and privileges providing access to said assigned compartments and levels are added to the set of privileges mapped to one or more of the defined roles.
- 6. The method of claim 1, wherein said step of determining whether the subject is assigned to a role having privileges corresponding to the compartment and level of the requested object within said lattice-based multi-level security system is performed by:
- assigning each defined role in a group of roles to a heirarchical tree, wherein a root role R.sub.0 represents one or more privileges available to all roles in the group, and child nodes R.sub.j can access all privileges associated with role R.sub.j and any associated with roles R.sub.i, where roles R.sub.i are any ancestor nodes of R.sub.j ;
- associating roles at level l of the tree, where n.sub.l indicates the number of nodes at level l, with unique sets of compartments drawn from the set of remaining compartments;
- choosing c compartments from the remaining set of compartments and removing these c compartments from the set of compartments available to designate roles; and
- assigning a unique set of compartments to each privilege set at level l from the set of c compartments chosen.
CROSS-REFERENCE TO RELATES APPLICATION
This application claims priority from Provisional Patent Application Ser. No. 60/032,531, filed Dec. 6, 1996.
US Referenced Citations (17)
Foreign Referenced Citations (1)
Number |
Date |
Country |
94112649 |
Aug 1994 |
EPX |
Non-Patent Literature Citations (1)
Entry |
Ferraiolo and Kuhn, "Role-Based Access Controls" Proc. 15th NIST-NSA Natil Computer Security Conference (1992). |