U.S. application Ser. No. 11/479,356 is related to: U.S. application Ser. No. 11/478,745 filed on Jun. 30, 2006;” U.S. application Ser. No. 11/478,747 filed on Jun. 30, 2006;” U.S. application Ser. No. 11/479,532 filed on Jun. 30, 2006;” and U.S. application Ser. No. 11/479,514 filed on Jun. 30, 2006, the disclosure of which is incorporated by reference herein.
The present invention relates to information technology (IT) systems and, more particularly, methods and apparatus for providing role-based access control of a system resource.
In IT systems, a technical means for controlling access to computing or information resources must be provided for security purposes. A resource could represent data such as a file or database, network elements such as routers and switches, or computer systems. Access is the ability to manipulate, for example, view, add, modify, or delete, a resource. Access control is the means by which the ability to access is explicitly enabled or restricted in some way through system administration. Access controls can prescribe not only who or what process or entity may have access to a specific system resource, but also the type of access that is permitted.
The traditional Role-Based Access Control (RBAC) is a powerful technique developed for controlling access to resources in a complex system. With role-based access control access rights are grouped by role name, and the use of resources is restricted to users authorized to assume the associated role. For example, within an IT system the role of system administrator can include operations to perform resource viewing, addition, modification, deletion while the role of librarian can only include operations to view system resources. The advantage of having roles with associated groups of subjects is that by changing the permissions of a single role, the access rights of all the subjects in the group are changed.
However, there are drawbacks with the traditional RBAC system, especially in large distributed systems because subjects with the same role always have the same set of permissions against the same set of resources.
Subjects having the same role cannot be assigned access to different resources. Therefore, a subject belonging to a first organization having the same roles and permissions as a subject belonging to a second organization may have access to resources of the second organization. Additionally, there is no mechanism to distinguish a role across organizations in a large scale system where multiple organizations may be operating concurrently. To simplify the management of a large scale modern IT system, it is desirable to have a role that can have different meanings from organization to organization. For example, in a grid computing environment, the access rights of a role, such as librarian, may vary from organization to organization, and the role may have a different set of permissions in each organization, more specifically, organizations can independently assign permissions to roles according to local policies.
In accordance with the aforementioned and other objectives, the embodiments of the present invention are directed towards methods and apparatus for scoped role-based access control of a resource by a subject in an access control system.
For example, in one aspect of the present invention a method of providing role-based access control of a resource by a subject in an access control system is provided. It is determined if the resource is accessible by the subject. When the resource is accessible by the subject, it is determined if the resource is accessible by a role and an associated permission of the subject. When the resource is accessible by the role and the associated permission of the subject, access control of the resource by the subject is permitted. When the resource is not accessible by the subject or the role and the associated permission of the subject, access control of the resource by the subject is denied.
In additional embodiments of the present invention, it is determined if a table of one or more subjects that may access the resource comprises the subject. Further, it is determined if a table of one or more role-permission pairs that may access the resource comprise the role and the associated permission of the subject.
In another aspect of the invention, a role-based access control system is provided. The system comprises one or more roles capable of association with one or more subjects, and a plurality of permission sets. One or more of the plurality of permission sets are associated with each of the one or more roles. The system further comprises a plurality of resources. One or more of the plurality of resources are associated with each of the one or more permission sets, and each of the plurality of resources is associated with a set of one or more subjects. A given subject in a set of one or more subjects for a given resource and having a role-permission association with the given resource is provided access control of the given resource.
The embodiments of the present invention provide a scoped role-based access control system, in which a role is associated with multiple sets of permissions and multiple resources are bound to a permission set. A scope is created to associate subjects with resources and another scope is created to associate a set of resources with a role/permission set. This allows multiple subjects having the same role to have different set of permissions associated with their roles against separate sets of resources.
These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
As will be illustrated in detail below, the embodiments of the present invention introduce techniques for providing scoped role-based access control of a resource by a subject in an access control system.
Referring initially to
Referring now to
Another scope is created to associate a set of subjects with a resource. For example subject-1214 and subject-2216 may be associated with resource-1208, while subject-3218 may not be associated with resource-1208. In such an embodiment, only subject-1214 and subject-2216 may access resource-1208. This scope conveys specific resource access rights to subjects that are granted that scope. Subjects having the same role can be assigned access to different resources. Therefore, even when roles and permission sets are the same in two separate organizations, the subjects from one organization may be prevented from accessing resources from another organization.
Thus, multiple subjects having the same role are given different permissions against separate resources across organizations in a complex modern computing environment. This extension does not affect the RBAC property that let the subject to role assignment be done independently from role to permission creation.
The embodiments of the present invention implement an access control operation that decides whether a subject in a particular role has the permission to perform an action in a given resource, more specifically, deny or allow access.
In accordance with a decentralized embodiment of the present invention, each resource maintains a table of subjects that are allowed to access the resource, similar to an access control list. This table maintains the subject-resource scope described above. In addition to this table, the resource maintains a second table that stores pairs of role-permission entries. This table maintains the role-permission scope for each resource. An entry in the table indicates that any subject with the role of the entry has the permission indicated in the entry. Multiple entries may exist per role and multiple entries may exist per permission.
Referring now to
Tables may be implemented using distributed relational databases or distributed hashing tables. In this case a centralized system can implement the access control operation and the maintenance of the tables can be distributed to the resources. A fully centralized system can also be developed by keeping all the tables in a single database maintained by the access control system and not by the resources.
In accordance with the embodiments of the present invention multiple users in the same role may be allowed access to different resources, and a user in a role may have different permissions according to the resources he or she is trying to access.
If two users with access to the same resource under the same role will be allowed different permissions the two scope as described tables above may be combined in a single table. In this case, for each user, if a user can take a given role, there must be a subject-role-permission entry for each permission of the subject able to perform in that role.
Referring now to
As shown, the computer system may be implemented in accordance with a processor 410, a memory 412, I/O devices 414, and a network interface 416, coupled via a computer bus 418 or alternate connection arrangement.
It is to be appreciated that the term “processor” as used herein is intended to include any processing device, such as, for example, one that includes a CPU (central processing unit) and/or other processing circuitry. It is also to be understood that the term “processor” may refer to more than one processing device and that various elements associated with a processing device may be shared by other processing devices.
The term “memory” as used herein is intended to include memory associated with a processor or CPU, such as, for example, RAM, ROM, a fixed memory device (e.g., hard drive), a removable memory device (e.g., diskette), flash memory, etc.
In addition, the phrase “input/output devices” or “I/O devices” as used herein is intended to include, for example, one or more input devices (e.g., keyboard, mouse, scanner, etc.) for entering data to the processing unit, and/or one or more output devices (e.g., speaker, display, printer, etc.) for presenting results associated with the processing unit.
Still further, the phrase “network interface” as used herein is intended to include, for example, one or more transceivers to permit the computer system to communicate with another computer system via an appropriate communications protocol.
Software components including instructions or code for performing the methodologies described herein may be stored in one or more of the associated memory devices (e.g., ROM, fixed or removable memory) and, when ready to be utilized, loaded in part or in whole (e.g., into RAM) and executed by a CPU.
Although illustrative embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various other changes and modifications may be made by one skilled in the art without departing from the scope or spirit of the invention.
This application is a continuation of pending U.S. application Ser. No. 11/479,356 filed on Jun. 20, 2006, the disclosure of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5220604 | Gasser et al. | Jun 1993 | A |
5265221 | Miller | Nov 1993 | A |
5881225 | Worth | Mar 1999 | A |
5911143 | Deinhart et al. | Jun 1999 | A |
6014666 | Helland et al. | Jan 2000 | A |
6044466 | Anand et al. | Mar 2000 | A |
6088679 | Barkley | Jul 2000 | A |
6202066 | Barkley et al. | Mar 2001 | B1 |
6233576 | Lewis | May 2001 | B1 |
6460141 | Olden | Oct 2002 | B1 |
6772167 | Snavely et al. | Aug 2004 | B1 |
6947989 | Gullotta et al. | Sep 2005 | B2 |
6965994 | Brownell et al. | Nov 2005 | B1 |
7181017 | Nagel et al. | Feb 2007 | B1 |
7308702 | Thomsen et al. | Dec 2007 | B1 |
7404203 | Ng | Jul 2008 | B2 |
7415509 | Kaltenmark et al. | Aug 2008 | B1 |
7418490 | Zhang et al. | Aug 2008 | B1 |
7523506 | Kumar et al. | Apr 2009 | B1 |
7685206 | Mathew et al. | Mar 2010 | B1 |
20020026592 | Gavrila et al. | Feb 2002 | A1 |
20020143735 | Ayi et al. | Oct 2002 | A1 |
20020178119 | Griffin et al. | Nov 2002 | A1 |
20030078932 | Kaiserwerth et al. | Apr 2003 | A1 |
20030105974 | Griffin et al. | Jun 2003 | A1 |
20030107591 | Jameson | Jun 2003 | A1 |
20030167269 | Gupta | Sep 2003 | A1 |
20030229623 | Chang et al. | Dec 2003 | A1 |
20040003112 | Alles et al. | Jan 2004 | A1 |
20040044655 | Cotner et al. | Mar 2004 | A1 |
20040083367 | Garg et al. | Apr 2004 | A1 |
20040268146 | Oberst | Dec 2004 | A1 |
20050138419 | Gupta et al. | Jun 2005 | A1 |
20050172151 | Kodimer et al. | Aug 2005 | A1 |
20060047657 | Frieder et al. | Mar 2006 | A1 |
20060089932 | Buehler et al. | Apr 2006 | A1 |
20060136991 | Kern | Jun 2006 | A1 |
20060161554 | Lucovsky et al. | Jul 2006 | A1 |
20060218394 | Yang | Sep 2006 | A1 |
20060259980 | Field et al. | Nov 2006 | A1 |
20070089162 | Park et al. | Apr 2007 | A1 |
20070283443 | McPherson et al. | Dec 2007 | A1 |
20070294236 | Vaughan et al. | Dec 2007 | A1 |
Entry |
---|
Georgiadis et al, Flexible Team-based Access Control Using Contexts, SACMAT 2001, ACM 2001. |
Kern and Walhorn, Rule Support for Role-Based Access Control, Proceedings of the 10th ACM Symp. on Access Control Models and Technologies (SACMAT'05), ACM (2005) pp. 130-138. |
Al-Kahtani and Sandhu. “Rule-Based RBAC with Negative Authorizations”. In Proceedings of the 20th Annual Computer Security Applications Conference, Dec. 2004. |
Al-Kahtani and Sandhu “A Model for Attribute-Based User-Role Assignment”, In Proceedings of the 18th Annual Computer Security Applications Conference, Dec. 2002 pp. 353-362. |
Sandhu et al, Role-Based Access Control Models, IEEE Computer, vol. 29, No. 2, Feb. 1996, pp. 38-47. |
Sandhu, Role-Based Access Control, Advances in Computers, vol. 46, Academic Press, 1998. |
Osborn et al, Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and System Security, vol. 3, No. 2, May 2000, pp. 85-106. |
Giuri and Iglio. A formal model for role-based access control with constraints, Proceedings of the Ninth IEEE Computer Security Foundations Workshop, IEEE, 1996. pp. 136-145. |
Luigi Giuri. Role-based access control: a natural approach. In Proceedings of the First ACM Workshop on Role-Based Access Control (RBAC'95), pp. II-33-37,1995. |
Chen and Sandhu, Constraints for RBAC, ACM RBAC Workshop, 1996. |
N. Damianou, et al. Ponder—A Language for Specifying Security and Management Policies for Distributed Systems. The Language Specification, Version 1.11 Imperial College Research ReportDoC 2000/1, Jan. 18, 2000 http://www.doc.ic.ac.uk/research/technicalreports/2000/DTR00-1.pdf. |
Taylor & Murty, Implementing RBAC for Federated Information Systems on the Web, in: Australasian Information Security Workshop 2003 (AISW2003), Australian Computer Society, Inc., 2003. |
Kalish and Montague, Logic: Techniqus of Formal Reasoning, Second Edition, Oxford Press, 1980. |
Ferraiolo et al, “Role-Based Access Control”, Artech House, (2003). |
Ferraiolo, Barkley and Kuhn, A Role-Based Access Control Model and Reference Implementation Within a Corporate Intranet, ACM Transactions on Information and System Security, vol. 2, No. 1, Feb. 1999, pp. 34-64. |
Ferraiolo & Kuhn, “Role-Based Access Control,” Proceedings of 15th National Computer Security Conference, (1992) pp. 554-563. |
Goodwin et al, “Instance-level access control for business-to-business electronic commerce” IBM Systems Journal, vol. 41, No. 2, 2002, pp. 303-317. |
Thomsen et al. Role Based Access Control Framework for Network Enterprises, Proceedings 14th Annual Computer Security Applications Conference, 1998 pp. 50-58. |
Zhang et al. A Role-Based Access Control Model and Implementation for Data-Centric Enterprise Applications: ICICS 2001, LNCS 2229, Springer-Verlag, 2001, pp. 316-327. |
Strembeck and Neumann, An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments, ACM Transactions on Information and System Security, vol. 7, No. 3, Aug. 2004, pp. 392-427. |
Spengler, “Increasing Performance and Granularity in Role-Based Access Control Systems”, 2005 http://www.grsecurity.net/researchpaper.pdf. |
Barkley et al, Role Based Access Control for the World Wide Web, 20th National Information System Security Conference NIST/NSA, 1997. |
Lampson, B. W., “Protection,” in Proc. Fifth Princeton Symposium on Information Sciences and Systems, Princeton University, Mar. 1971, pp. 437-443, reprinted in Operating Systems Review, 8,1, ACM, Jan. 1974, pp. 18-24. |
A. Belokosztolszki, Role-based access control policy administration, University of Cambridge Tech Report No. 586 (Mar. 2004). |
Blobel et al. Modelling privilege management and access control, International Journal of Medical Informatics vol. 75 (2006) pp. 597- 623. |
Giuri. Role-based access control: a natural approach. In Proceedings of the First ACM Workshop on Role-Based Access Control (RBAC'95), pp. II-33-37,1995. |
Giuri & Iglio. A formal model for role-based access control with constraints, Proceedings of the Ninth IEEE Computer Security Foundations Workshop, IEEE, 1996. pp. 136-145. |
D. Ferraiolo et al., entitled “Role-Based Access Control,” Proceedings of 15th National Computer Security Conference, pp. 1-11, 1992. |
Number | Date | Country | |
---|---|---|---|
20080243856 A1 | Oct 2008 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11479356 | Jun 2006 | US |
Child | 12135535 | US |