privilege
j
s , the target role
i
r should satisfy
[, ]drpa i j =1. Step 2 builds a temporary role set
i
I
from each target privilege (where1 ik≤≤ , k is
the number of the target privileges), and set the
temporary role set as must-in role if the must-in role
exists for the target privilege. Step 3 generates all
possible role sets
j
TR
by picking up one role from
each
i
I
. Step 5 sorts the overall satisfaction degree
j
TR
. The combined role set
TR
with the biggest
value of
max
is the role set that we are searching
for. Because of the role constraints C, it is possible
that there does not exist such a role set that can
access all target privileges and satisfy the role
constraints C.
In a large-scale RBAC system, it requires quite
amount of computation in the step 3 and step 5 of
the Algorithm 3, and it is difficult or impossible to
enforce the principle of least privilege based on
intuitive observations or conventional approaches
for user-role assignments. The Algorithm 3 can thus
be used for the automatic generation of user-role
assignment that conforms the principle of least
privilege.
5 CONCLUSION
The principle of least privilege is important to many
RBAC applications. In this paper, we introduced and
defined the concepts to quantitatively measure the
enforcement of the principle of least privileges.
Two algorithms to find the perfect and optimal user-
role assignments that meet the principle of least
privilege are presented. The proposed approach for
the enforcement of least principle is particularly
useful for automatic generation of user-role
assignment in large-scale RBAC systems in which it
is difficult to enforce the principle of least privilege
based on intuitive observations or conventional
approaches for user-role assignments.
REFERENCES
Ahn, G., and Sandhu, R., 2000. Role-based authorization
constraints specification. ACM Transactions on
Information and System Security, Vol. 3 No. 4,
November 2000, pp 207-226.
Bertino, E., Bonatti, P. A., and Ferrari,E., 2001. TRBAC:
A temporal role-based access control model. ACM
Transactions on Information & System Security, Vol.
4, No. 3, Aug.2001, pp 191-233.
Bertino, E., Ferrari, E., and Atluri, V., 1999. The
specification and enforcement of authorization
constraints in workflow management systems. ACM
Transactions on Information and System Security,
Vol. 2, No. 1, 1999, pp 65-104.
Ferraiolo, D. F., Gilbert, D. M., and Lynch, N., 1993. An
examination of federal and commercial access control
policy needs. In Proceedings of NISTNCSC National
Computer Security Conference, Baltimore, MD,
September 1993, pp 107-116.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R.,
Chandramouli, R., 2001. Proposed NIST standard for
role-based access Control. ACM Transactions on
Information and System Security, Vol. 4, No. 3,
August 2001, pp 224-274.
Giuri, L., 1997. Role-based access control: A natural
approach. In Proceedings of the 1st ACM Workshop
on Role-Based Access Control, ACM, 1997, Pages II,
pp 33-37.
Howard, M., and LeBlanc, D., 2003. Writing secure code.
Microsoft Press, 2003.
Osborn, S., Sandhu, R., and Munawer, Q., 2000.
Configuring role-based access control to enforce
mandatory and discretionary access control policies.
ACM Transactions on Information and System
Security, Vol. 3, No. 2, May 2000, pp 85-106.
Sandhu, R., Coyne, E. J., Feinstein, H. L., Youman, C.
E., 1996. Role-based access control models. IEEE
Computer, Vol. 29, No. 2, IEEE Press, February 1996,
pp 38-47.
Saltzer, J. H., and Schroeder, M.D., 1975. The protection
of information in computer systems. Proceedings of
the IEEE, Vol. 63, No. 9, September 1975, pp 1278-
1308.
Zhang, C. N. and Yang, C., 2003. Integrating object-
oriented role-based access control model with
mandatory access control principles. The Journal of
Computer Information Systems, Vol. 43, No. 3, 2003,
pp 40-49.
SECRYPT 2006 - INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY
74