Page 193 - DCAP403_Operating System
P. 193

Operating System




                    Notes          Role-based Access Control

                                   Role-based access control (RBAC) enforces access controls depending upon a user’s role(s).
                                   Roles represent specific organisational duties and are commonly mapped to job titles such as

                                   “Administrator,” “Developer,” or “System Analyst.” Obviously, these roles require vastly
                                   different network access privileges.
                                   Role defi nitions and associated access rights must be based upon a thorough understanding of
                                   an organisation’s security policy. In fact, roles and the access rights that go with them should be
                                   directly related to elements of the security policy.

                                   Take-grant Model

                                   The access matrix model, properly interpreted, corresponds very well to a wide variety of actual

                                   computer system implementations. The simplicity of the model, its definition of subjects, objects,
                                   and access control mechanisms, is very appealing. Consequently, it has served as the basis for
                                   a number of other models and development efforts. You now discuss a model based on access
                                   matrix.
                                   Take-grant models use graphs to model access control. They have been well researched. Although
                                   explained in the terms of graph theory, these models are fundamentally access matrix models.
                                   The graph structure can be represented as an adjacency matrix, and labels on the arcs can be
                                   coded as different values in the matrix.
                                   In a take-grant model, the protection state of a system is described by a directed graph that
                                   represents the same information found in an access matrix. Nodes in the graph are of two types,
                                   one corresponding to subjects and the other to objects. An arc directed from a node A to another
                                   node B indicates that the subject (or object) A has some access right(s) to subject (or object) B. The
                                   arc is labeled with the set of A’s rights to B. The possible access rights are read (r), write (w), take
                                   (t), and grant (g). Read and write have the obvious meanings. “Take” access implies that node A
                                   can take node B’s access rights to any other node.


                                         Example: If there is an arc labeled (r, g) from node B to node C, and if the arc from A to
                                   B includes a “t” in its label, then an arc from A to C labeled (r, g) could be added to the graph.
                                   Conversely, if the arc from A to B is marked with a “g”, B can be granted any access right A
                                   possesses. Thus, if A has (w) access to a node D and (g) access to B, an arc from B to D marked
                                   (w) can be added to the graph.


                                                       A       t        B       r, g      C

                                                                     Initial Graph




                                                                         r, g




                                                       A       t        B       r, g     C

                                                            Graph following A takes (r, g to C)
                                                                      Take





          186                              LOVELY PROFESSIONAL UNIVERSITY
   188   189   190   191   192   193   194   195   196   197   198