SlideShare a Scribd company logo
ROLE BASED ACCESS CONTROL (RBAC)
AND ROLE BASED SECURITY
One of the most challenging problems in managing large
networks is the complexity of security administration. Role
based access control (also called role based security), as
formalized in 1992 by David Ferraiolo and Rick Kuhn (pdf), has
become the predominant model for advanced access control
because it reduces this cost. A variety of IT vendors, including
IBM, Sybase, Secure Computing, and Siemens began developing
products based on this model in 1994. In 2000, the Ferraiolo-
Kuhn model was integrated with the framework of Sandhu et al.
(pdf) to create a unified model for RBAC, published as the
NIST RBAC model (Sandhu, Ferraiolo, and Kuhn, 2000 - pdf)
and adopted as an ANSI/INCITS standard in 2004. Today, most
information technology vendors have incorporated RBAC into
their product lines, and the technology is finding applications in
areas ranging from health care to defense, in addition to the
mainstream commerce systems for which it was designed. As of
2010, the majority of users in enterprises of 500 or more are
now using RBAC, according to the Research Triangle Institute.
For more information, please contact us at: [email protected].
ABAC Workshop, was held July 17, 2013.
Economic Benefits of Role Based Access Control Analyzes
economic value of RBAC for the enterprise and for the national
economy, and provides quantitative economic benefits of
RBAC per employee for adopting firms. Of particular interest
to firms considering RBAC, report calculates savings from
reduced employee downtime, more efficient provisioning, and
more efficient access control policy administration, beyond the
added security provided by RBAC. NIST's RBAC research was
estimated to have contributed $1.1 billion in economic value.
(pdf - Feb. 2011, Research Triangle Institute)
RBAC vs. ABAC - attribute based access control. ABACis a
rule-based approach to access control that can be easy to set up
but complex to manage. We are investigating both practical and
theoretical aspects of ABAC and similar approaches. The
following papers discuss ABAC and tradeoffs in design:
E.J. Coyne, T.R. Weil, ABAC and RBAC: Scalable, Flexible,
and Auditable Acces Management, IEEE IT Professional,
May/June 2013. - reviews tradeoffs and characteristics of role
based and attribute based approaches.
D.R. Kuhn, "Vulnerability Hierarchies in Access Control
Configurations", 4th Symposium on Configuration Analytics
and Automation (SAFECONFIG) 2011, IEEE.Oct. 31 – Nov. 1
Arlington, Virginia. pp. 1-9: shows that hierarchies of
vulnerability detection conditions exist in ABAC rules, such
that tests which detect one class of vulnerability are guaranteed
to detect other classes.
D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to Role
Based Access Control", IEEE Computer, June, 2010, pp. 79-81:
discusses revisions to RBAC standard being developed to
combine advantages of RBAC and ABAC approaches.
INCITS CS1.1 standards update 2012 - discussing proposal for
Role Based Access Control
· Colloquim presentation on Role Based Access Control and
standards, by Tim Weil at University of Denver
· Next Generation Standard. email [email protected] for details.
· Overview of potential revisions to RBAC standard published
in IEEE Computer, June 2010
· Revisions are solicited for INCITS 359-2004 RBAC standard.
Contact us if you would like to participate in revising the
RBAC standard. This work will be conducted through INCITS.
More information here.
· Presentation on INCITS 459 RBAC Implementation and
Interoperability Std
New to RBAC? - these sections of the site can be helpful:
Primary RBAC References/Background (below), RBAC FAQ,
RBAC Case Studies.
Implementing RBAC? - you may want to start with: Role
Engineering and RBAC Standards, RBAC Case Studies.
Researcher or student? - see Primary RBAC
References/Background (below) and other research papers on
this page.
Economic Impact: NIST's RBAC research saves industry $1.1
billion (pdf - Feb. 2011)
Back to Top
Primary Rbac References/Background
RBAC Model
D.F. Ferraiolo and D.R. Kuhn (1992) "Role Based Access
Control" 15th National Computer Security Conference, Oct 13-
16, 1992, pp. 554-563. - introduced formal model for role
based access control HTMLPDF.
R. S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman (1996),
"Role-Based Access Control Models", IEEE Computer 29(2):
38-47, IEEE Press, 1996.- proposed a framework for RBAC
models PDF
RBAC Standard
Original proposal: R. Sandhu, D.F. Ferraiolo, D, R. Kuhn
(2000), "The NIST Model for Role Based Access Control:
Toward a Unified Standard," PostscriptPDFProceedings, 5th
ACM Workshop on Role Based Access Control, July 26-27,
2000, Berlin, pp.47-63 - first public draft of the NIST RBAC
model and proposal for an RBAC standard.
Current standard: American National Standard 359-2004 is the
information technology industry consensus standard for RBAC.
An explanation of the model used in the standard can be found
in the original proposal above. The official standards document
is published by ANSI INCITS.
D.F. Ferraiolo, R. Kuhn, R. Sandhu (2007), "RBAC Standard
Rationale: comments on a Critique of the ANSI Standard on
Role Based Access Control', IEEE Security & Privacy, vol. 5,
no. 6 (Nov/Dec 2007), pp. 51-53 - PDF - explains decisions
made in developing RBAC standard.
NEW: D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to
Role Based Access Control", IEEE Computer, vol. 43, no. 6
(June, 2010), pp. 79-81.
RBAC for web services standard: Web applications can use
RBAC services defined by the OASIS XACML Technical
Committee (see "XACML RBAC Profile"). The XACML
specification describes building blocks from which an RBAC
solution is constructed. A full example illustrates these
building blocks. The specification then discusses how these
building blocks may be used to implement the various elements
of the RBAC model presented in ANSI INCITS 359-2004.
Rbac Topics
</div>
RBAC Design & Implementation <a href="javascript:void(0)"
class="expandLink" onclick="exp('div','exp3');"><font
face="Webdings" color="#999">4</font>Expand List of
Documentation</a> <div class="greybox" exp3='yes'
style="display:none;">
· D.F. Ferraiolo and D.R. Kuhn (1992) "Role Based Access
Control" 15th National Computer Security Conf. Oct 13-16,
1992, pp. 554-563. HTMLPDF - the original paper that
evolved into the NIST RBAC model.
· "An Introduction to Role Based Access Control" NIST CSL
Bulletin on RBAC (December, 1995) HTMLText
· D.F. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role Based
Access Control (book), Artech House, 2003, 2nd Edition, 2007.
· D. Ferraiolo, J. Cugini, R. Kuhn, "Role Based Access Control:
Features and Motivations," Proceedings, Annual Computer
Security Applications Conference, IEEE Computer Society
Press, 1995. - extends 1992 model.
· D.R. Kuhn, "Mutual Exclusion of Roles as a Means of
Implementing Separation of Duty in Role-Based Access Control
Systems" Second ACM Workshop on Role-Based Access
Control. 1997 PDF - defines necessary and sufficient
conditions for safe separation of duty.
· R. Chandramouli, R. Sandhu, "Role Based Access Control
Features in Commercial Database Management Systems", 21st
National Information Systems Security Conference, October 6-
9, 1998, Crystal City, Virginia. Best Paper Award! PDF - survey
of RBAC implementations.
· S. Gavrila, J. Barkley, "Formal Specification for Role Based
Access Control User/Role and Role/Role Relationship
Management" (1998), Third ACM Workshop on Role-Based
Access Control. PDFPostscript
· D.R. Kuhn. "Role Based Access Control on MLS Systems
Without Kernel Changes" Third ACM Workshop on Role Based
Access Control,October 22-23,1998. PDFPostscript - how to
simulate RBAC on MAC systems.
· J. Barkley, C. Beznosov, Uppal, "Supporting Relationships in
Access Control using Role Based Access Control", Fourth ACM
Workshop on Role-Based Access Control (1999). Postscript
· R. Sandhu, D. Ferraiolo, R. Kuhn, "The NIST Model for Role
Based Access Control: Towards a Unified Standard,"
Proceedings, 5th ACM Workshop on Role Based Access
Control, July 26-27, 2000, Berlin,pp.47-63. - initial proposal for
the current INCITS 359-2004 RBAC standard.
· W.A. Jansen, "Inheritance Properties of Role Hierarchies,"
21st National Information Systems Security Conference,
October 6-9, 1998, Crystal City, Virginia. PostscriptPDF -
analyzes permission inheritance in RBAC.
· R. Chandramouli,"Business Process Driven Framework for
defining an Access Control Service based on Roles and Rules",
23rd National Information Systems Security Conference, 2000.
PDF
· W.A. Jansen, "A Revised Model for Role Based Access
Control", NIST-IR 6192, July 9, 1998 PostscriptPDF
· Slide Presentation from DOE Security Research Workshop III,
(Barkley, 1998). PowerPoint
· Slide Presentation Summarizing RBAC Projects Postscript
· "A Marketing Survey of Civil Federal Government
Organizations to Determine the Need for RBAC Security
Product" (SETA Corporation, 1996). Postscript
· D. F. Ferraiolo, .Chandramouli, G.J. Ahn, S.I. Gavrila, The
role control center: features and case studies, SACMAT '03:
Proceedings of the eighth ACM symposium on Access control
models and technologies, Como, Italy, 2003, pp. 12-20.
Back to Top
</div>
Access Control System Testing
· D.R. Kuhn, "Vulnerability Hierarchies in Access Control
Configurations", 4th Symposium on Configuration Analytics
and Automation, IEEE, Oct. 31 - Nov. 1, 2011, Arlington, VA.
· V. Hu, D.R. Kuhn, T. Xie,"Property Verification for Generic
Access Control Models", IEEE/IFIP International Symposium
on Trust, Security, and Privacy for Pervasive Applications,
Shanghai, China, Dec. 17-20, 2008.
· Object Oriented Design
· J. Barkley, "Implementing Role Based Access Control Using
Object Technology", First ACM Workshop on Role-Based
Access Control (1995). HTMLPostscript
· J.F. Barkley, A.V. Cincotta, "Managing Role/Permission
Relationships Using Object Access Types", Third ACM
Workshop on Role Based Access Control (1998). HTML
· "A Resource Access Decision Service for CORBA-based
Distributed Systems" (Beznosov, Deng, Blakley, Burt, Barkley,
1999), ACSAC (Annual Computer Security Applications
Conference). Postscript
· S. Wakid, J.F. Barkley, M.Skall, "Object Retrieval and Access
Management in Electronic Commerce", IEEE Communications
Magazine, September 1999. HTML
Back to Top
</div>
XML RBAC Administration<a href="javascript:void(0)"
class="expandLink" onclick="exp('div','exp4');"><font
face="Webdings" color="#999">4</font>Expand List of
Documentation</a> <div class="greybox" exp4='yes'
style="display:none;">
· R.Chandramouli, "Application of XML Tools for Enterprise-
Wide RBAC Implementation Tasks" - 5th ACM workshop on
Role-based Access Control, July 26-27, 2000, Berlin, Germany.
- PDF
· R.Chandramouli, Specification and Validation of Enterprise
Access Control Data for Conformance to Model and Policy
Constraints, 7th World Multi-conference on Systemics,
Cybernetics and Informatics (SCI 2003). Best Paper Award!
PDF
Back to Top
Cost/Benefits Analysis <a href="javascript:void(0)"
class="expandLink" onclick="exp('div','exp2');"><font
face="Webdings" color="#999">4</font>Expand List of
Documentation</a> <div class="greybox" exp2='yes'
style="display:none;">
· The Economic Impact of Role Based Access Control. Research
Triangle Institute. NIST Planning Report 02-01. 2002 PDF
· D. Ferraiolo and J.F. Barkley, "Comparing Administrative
Cost for Hierarchical and Non-hierarchical Role
Representations," Second ACM Workshop on Role-Based
Access Control, Nov 6-7, 1997.
· J. Barkley, "Comparing Simple Role Based Access Control
Models and Access Control Lists" (1997), Second ACM
Workshop on Role-Based Access Control. Postscript
· "A Marketing Survey of Civil Federal Government
Organizations to Determine the Need for RBAC Security
Product" (SETA Corporation, 1996). Postscript
Back to Top
RBAC Web Servers <a href="javascript:void(0)"
class="expandLink" onclick="exp('div','exp5');"><font
face="Webdings" color="#999">4</font>Expand List of
Documentation</a> <div class="greybox" exp5='yes'
style="display:none;">
· D.F. Ferraiolo, J. Barkley, D.R. Kuhn, "A Role Based Access
Control Model and Reference Implementation within a
Corporate Intranet", ACM Transactions on Information Systems
Security, Volume 1, Number 2, February 1999. PDFPostscript
· D.F. Ferraiolo, J. Barkley,"Specifying and Managing Role-
Based Access Control within a Corporate Intranet" (1997),
Second ACM Workshop on Role-Based Access Control.
PDFPostscript
· J. Barkley, A.V. Cincotta, D.F. Ferraiolo, S. Gavrila, , D.R.
Kuhn, "Role Based Access Control for the World Wide Web",
20th National Computer Security Conference (1997).
PDFPostscript
· "Role Based Access Control for the World Wide Web" Slide
Presentation Postscript
· J. Barkley, D.R. Kuhn, L. Rosenthal, M. Skall, A.V. Cincotta,
"Role-Based Access Control for the Web", CALS Expo
International & 21st Century Commerce 1998: Global Business
Solution
s for the New Millennium (1998). HTML
</div>
Back to Top
Detailed Overview
Security administration can be costly and prone to error because
administrators usually specify access control lists for each user
on the system individually. With RBAC, security is managed at
a level that corresponds closely to the organization's structure.
Each user is assigned one or more roles, and each role is
assigned one or more privileges that are permitted to users in
that role. Security administration with RBAC consists of
determining the operations that must be executed by persons in
particular jobs, and assigning employees to the proper roles.
Complexities introduced by mutually exclusive roles or role
hierarchies are handled by the RBAC software, making security
administration easier.
This web site explains RBAC concepts, costs vs.benefits and
economic impact of RBAC, design and implementation issues,
the proposed standard, and advanced research topics. The NIST
model for RBAC was adopted as an American National Standard
by the American National Standards Institute, International
Committee for Information Technology Standards
(ANSI/INCITS) on February 11, 2004. See the RBAC Standards
Section for more information.
PAGE FOOTER STARTS HERE: INFO, CONTACT EMAIL,
UPDATE/CREATE DATES

More Related Content

PPTX
Project Review PPT Model FOR STUDENTS __
PPTX
Project Review PPT Model FOR STUDENTS __
PPTX
Cloud Achitecture and Security.pptx
PDF
Information Technology in Industry(ITII) - November Issue 2018
PDF
New Research Articles 2020 September Issue International Journal of Software ...
PPT
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
PDF
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
PPTX
csec66 a user mode implementation of filtering rule management plane on virtu...
Project Review PPT Model FOR STUDENTS __
Project Review PPT Model FOR STUDENTS __
Cloud Achitecture and Security.pptx
Information Technology in Industry(ITII) - November Issue 2018
New Research Articles 2020 September Issue International Journal of Software ...
Cloud Foundations: Visibility, Analytics, Security, Programming Models, Runtime
ICCCI_2016_Performance Evaluation of Fuzzy Integrated Firewall Model for Hybr...
csec66 a user mode implementation of filtering rule management plane on virtu...

Similar to ROLE BASED ACCESS CONTROL (RBAC) AND ROLE BASED SECURITYOne of.docx (20)

PPTX
PPT123456789101112131415161718192021.pptx
PDF
November 2024: Top 10 Read Articles in Network Security and Its Applications
PDF
October 2024 - Top 10 Read Articles in Network Security and Its Applications
PPTX
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
PDF
November 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
PDF
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
December 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
November 2022: Top 10 Read Articles in Network Security and Its Applications
DOCX
Wireless Information Security System via Role based Access Control Pattern Us...
PDF
August 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
February 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
April 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
August 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
September 2024: Top 10 Read Articles in Network Security and Its Applications
PDF
December 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
September 2022: Top 10 Read Articles in Network Security & Its Applications
PDF
April 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
WIRELESS COMPUTING AND IT ECOSYSTEMS
PPT123456789101112131415161718192021.pptx
November 2024: Top 10 Read Articles in Network Security and Its Applications
October 2024 - Top 10 Read Articles in Network Security and Its Applications
Computer Science Dissertation Topic Ideas For Phd Scholar - Phdassistance
November 2021 - Top 10 Read Articles in Network Security & Its Applications
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
December 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
December 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
Wireless Information Security System via Role based Access Control Pattern Us...
August 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
February 2024 - Top 10 Read Articles in Network Security & Its Applications
April 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
August 2022: Top 10 Read Articles in Network Security and Its Applications
September 2024: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
WIRELESS COMPUTING AND IT ECOSYSTEMS
Ad

More from joellemurphey (20)

DOCX
Eastern European countries appear to have become dependent on Ru.docx
DOCX
EAS 209 Second Response Paper Topic Assignment Due .docx
DOCX
Earth Science LabIn what order do materials settle in waterSo t.docx
DOCX
EarlyIntervention Strategies Paper (15 points)The pu.docx
DOCX
Early Hominids & Australopithecus SubscribeWhat is a too.docx
DOCX
Early scholarly and philosophical manuscripts were in Greek. However.docx
DOCX
Early Learning & Developmental Guidelines July 2017 1 .docx
DOCX
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
DOCX
Early childhood professionals have an essential role in creating.docx
DOCX
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
DOCX
Early Civilizations MatrixUsing your readings and outside sour.docx
DOCX
Early childhood teachers need to stay connected to what is occurring.docx
DOCX
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
DOCX
Earlier this semester, you participated in a class discussion about .docx
DOCX
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
DOCX
Earlean, please write these notes for me. October 01, 20181. My .docx
DOCX
eam Assignment 4 Teaming Across Distance and Culture..docx
DOCX
ead the following articleMother Tongue Maintenance Among North .docx
DOCX
eActivityGo to the United States Equal Employment Oppo.docx
DOCX
Each year on or around June 15, communities and municipalities aroun.docx
Eastern European countries appear to have become dependent on Ru.docx
EAS 209 Second Response Paper Topic Assignment Due .docx
Earth Science LabIn what order do materials settle in waterSo t.docx
EarlyIntervention Strategies Paper (15 points)The pu.docx
Early Hominids & Australopithecus SubscribeWhat is a too.docx
Early scholarly and philosophical manuscripts were in Greek. However.docx
Early Learning & Developmental Guidelines July 2017 1 .docx
Early Innovations and Their Impact Today Wilbur and Orville Wrig.docx
Early childhood professionals have an essential role in creating.docx
Early Constitutional ControversiesIn 1788, Alexander Hamilton and .docx
Early Civilizations MatrixUsing your readings and outside sour.docx
Early childhood teachers need to stay connected to what is occurring.docx
Early and Middle Adulthood PaperPrepare a 1,050- to 1,400-word.docx
Earlier this semester, you participated in a class discussion about .docx
EAP1640 - Level 6 Writing (Virtual College, MDC) Author P.docx
Earlean, please write these notes for me. October 01, 20181. My .docx
eam Assignment 4 Teaming Across Distance and Culture..docx
ead the following articleMother Tongue Maintenance Among North .docx
eActivityGo to the United States Equal Employment Oppo.docx
Each year on or around June 15, communities and municipalities aroun.docx
Ad

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Lesson notes of climatology university.
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
Cell Types and Its function , kingdom of life
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Anesthesia in Laparoscopic Surgery in India
Computing-Curriculum for Schools in Ghana
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Orientation - ARALprogram of Deped to the Parents.pptx
RMMM.pdf make it easy to upload and study
Weekly quiz Compilation Jan -July 25.pdf
Complications of Minimal Access Surgery at WLH
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Lesson notes of climatology university.
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Cell Types and Its function , kingdom of life
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Anesthesia in Laparoscopic Surgery in India

ROLE BASED ACCESS CONTROL (RBAC) AND ROLE BASED SECURITYOne of.docx

  • 1. ROLE BASED ACCESS CONTROL (RBAC) AND ROLE BASED SECURITY One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (also called role based security), as formalized in 1992 by David Ferraiolo and Rick Kuhn (pdf), has become the predominant model for advanced access control because it reduces this cost. A variety of IT vendors, including IBM, Sybase, Secure Computing, and Siemens began developing products based on this model in 1994. In 2000, the Ferraiolo- Kuhn model was integrated with the framework of Sandhu et al. (pdf) to create a unified model for RBAC, published as the NIST RBAC model (Sandhu, Ferraiolo, and Kuhn, 2000 - pdf) and adopted as an ANSI/INCITS standard in 2004. Today, most information technology vendors have incorporated RBAC into their product lines, and the technology is finding applications in areas ranging from health care to defense, in addition to the mainstream commerce systems for which it was designed. As of 2010, the majority of users in enterprises of 500 or more are now using RBAC, according to the Research Triangle Institute. For more information, please contact us at: [email protected]. ABAC Workshop, was held July 17, 2013. Economic Benefits of Role Based Access Control Analyzes economic value of RBAC for the enterprise and for the national economy, and provides quantitative economic benefits of RBAC per employee for adopting firms. Of particular interest to firms considering RBAC, report calculates savings from reduced employee downtime, more efficient provisioning, and more efficient access control policy administration, beyond the added security provided by RBAC. NIST's RBAC research was estimated to have contributed $1.1 billion in economic value. (pdf - Feb. 2011, Research Triangle Institute) RBAC vs. ABAC - attribute based access control. ABACis a rule-based approach to access control that can be easy to set up
  • 2. but complex to manage. We are investigating both practical and theoretical aspects of ABAC and similar approaches. The following papers discuss ABAC and tradeoffs in design: E.J. Coyne, T.R. Weil, ABAC and RBAC: Scalable, Flexible, and Auditable Acces Management, IEEE IT Professional, May/June 2013. - reviews tradeoffs and characteristics of role based and attribute based approaches. D.R. Kuhn, "Vulnerability Hierarchies in Access Control Configurations", 4th Symposium on Configuration Analytics and Automation (SAFECONFIG) 2011, IEEE.Oct. 31 – Nov. 1 Arlington, Virginia. pp. 1-9: shows that hierarchies of vulnerability detection conditions exist in ABAC rules, such that tests which detect one class of vulnerability are guaranteed to detect other classes. D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to Role Based Access Control", IEEE Computer, June, 2010, pp. 79-81: discusses revisions to RBAC standard being developed to combine advantages of RBAC and ABAC approaches. INCITS CS1.1 standards update 2012 - discussing proposal for Role Based Access Control · Colloquim presentation on Role Based Access Control and standards, by Tim Weil at University of Denver · Next Generation Standard. email [email protected] for details. · Overview of potential revisions to RBAC standard published in IEEE Computer, June 2010 · Revisions are solicited for INCITS 359-2004 RBAC standard. Contact us if you would like to participate in revising the RBAC standard. This work will be conducted through INCITS. More information here. · Presentation on INCITS 459 RBAC Implementation and Interoperability Std New to RBAC? - these sections of the site can be helpful: Primary RBAC References/Background (below), RBAC FAQ, RBAC Case Studies. Implementing RBAC? - you may want to start with: Role Engineering and RBAC Standards, RBAC Case Studies.
  • 3. Researcher or student? - see Primary RBAC References/Background (below) and other research papers on this page. Economic Impact: NIST's RBAC research saves industry $1.1 billion (pdf - Feb. 2011) Back to Top Primary Rbac References/Background RBAC Model D.F. Ferraiolo and D.R. Kuhn (1992) "Role Based Access Control" 15th National Computer Security Conference, Oct 13- 16, 1992, pp. 554-563. - introduced formal model for role based access control HTMLPDF. R. S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman (1996), "Role-Based Access Control Models", IEEE Computer 29(2): 38-47, IEEE Press, 1996.- proposed a framework for RBAC models PDF RBAC Standard Original proposal: R. Sandhu, D.F. Ferraiolo, D, R. Kuhn (2000), "The NIST Model for Role Based Access Control: Toward a Unified Standard," PostscriptPDFProceedings, 5th ACM Workshop on Role Based Access Control, July 26-27, 2000, Berlin, pp.47-63 - first public draft of the NIST RBAC model and proposal for an RBAC standard. Current standard: American National Standard 359-2004 is the information technology industry consensus standard for RBAC. An explanation of the model used in the standard can be found in the original proposal above. The official standards document is published by ANSI INCITS. D.F. Ferraiolo, R. Kuhn, R. Sandhu (2007), "RBAC Standard Rationale: comments on a Critique of the ANSI Standard on Role Based Access Control', IEEE Security & Privacy, vol. 5, no. 6 (Nov/Dec 2007), pp. 51-53 - PDF - explains decisions made in developing RBAC standard.
  • 4. NEW: D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to Role Based Access Control", IEEE Computer, vol. 43, no. 6 (June, 2010), pp. 79-81. RBAC for web services standard: Web applications can use RBAC services defined by the OASIS XACML Technical Committee (see "XACML RBAC Profile"). The XACML specification describes building blocks from which an RBAC solution is constructed. A full example illustrates these building blocks. The specification then discusses how these building blocks may be used to implement the various elements of the RBAC model presented in ANSI INCITS 359-2004. Rbac Topics </div> RBAC Design & Implementation <a href="javascript:void(0)" class="expandLink" onclick="exp('div','exp3');"><font face="Webdings" color="#999">4</font>Expand List of Documentation</a> <div class="greybox" exp3='yes' style="display:none;"> · D.F. Ferraiolo and D.R. Kuhn (1992) "Role Based Access Control" 15th National Computer Security Conf. Oct 13-16, 1992, pp. 554-563. HTMLPDF - the original paper that evolved into the NIST RBAC model. · "An Introduction to Role Based Access Control" NIST CSL Bulletin on RBAC (December, 1995) HTMLText · D.F. Ferraiolo, D.R. Kuhn, R. Chandramouli, Role Based Access Control (book), Artech House, 2003, 2nd Edition, 2007. · D. Ferraiolo, J. Cugini, R. Kuhn, "Role Based Access Control: Features and Motivations," Proceedings, Annual Computer Security Applications Conference, IEEE Computer Society Press, 1995. - extends 1992 model. · D.R. Kuhn, "Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems" Second ACM Workshop on Role-Based Access Control. 1997 PDF - defines necessary and sufficient conditions for safe separation of duty.
  • 5. · R. Chandramouli, R. Sandhu, "Role Based Access Control Features in Commercial Database Management Systems", 21st National Information Systems Security Conference, October 6- 9, 1998, Crystal City, Virginia. Best Paper Award! PDF - survey of RBAC implementations. · S. Gavrila, J. Barkley, "Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management" (1998), Third ACM Workshop on Role-Based Access Control. PDFPostscript · D.R. Kuhn. "Role Based Access Control on MLS Systems Without Kernel Changes" Third ACM Workshop on Role Based Access Control,October 22-23,1998. PDFPostscript - how to simulate RBAC on MAC systems. · J. Barkley, C. Beznosov, Uppal, "Supporting Relationships in Access Control using Role Based Access Control", Fourth ACM Workshop on Role-Based Access Control (1999). Postscript · R. Sandhu, D. Ferraiolo, R. Kuhn, "The NIST Model for Role Based Access Control: Towards a Unified Standard," Proceedings, 5th ACM Workshop on Role Based Access Control, July 26-27, 2000, Berlin,pp.47-63. - initial proposal for the current INCITS 359-2004 RBAC standard. · W.A. Jansen, "Inheritance Properties of Role Hierarchies," 21st National Information Systems Security Conference, October 6-9, 1998, Crystal City, Virginia. PostscriptPDF - analyzes permission inheritance in RBAC. · R. Chandramouli,"Business Process Driven Framework for defining an Access Control Service based on Roles and Rules", 23rd National Information Systems Security Conference, 2000. PDF · W.A. Jansen, "A Revised Model for Role Based Access Control", NIST-IR 6192, July 9, 1998 PostscriptPDF · Slide Presentation from DOE Security Research Workshop III, (Barkley, 1998). PowerPoint · Slide Presentation Summarizing RBAC Projects Postscript · "A Marketing Survey of Civil Federal Government Organizations to Determine the Need for RBAC Security
  • 6. Product" (SETA Corporation, 1996). Postscript · D. F. Ferraiolo, .Chandramouli, G.J. Ahn, S.I. Gavrila, The role control center: features and case studies, SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, Como, Italy, 2003, pp. 12-20. Back to Top </div> Access Control System Testing · D.R. Kuhn, "Vulnerability Hierarchies in Access Control Configurations", 4th Symposium on Configuration Analytics and Automation, IEEE, Oct. 31 - Nov. 1, 2011, Arlington, VA. · V. Hu, D.R. Kuhn, T. Xie,"Property Verification for Generic Access Control Models", IEEE/IFIP International Symposium on Trust, Security, and Privacy for Pervasive Applications, Shanghai, China, Dec. 17-20, 2008. · Object Oriented Design · J. Barkley, "Implementing Role Based Access Control Using Object Technology", First ACM Workshop on Role-Based Access Control (1995). HTMLPostscript · J.F. Barkley, A.V. Cincotta, "Managing Role/Permission Relationships Using Object Access Types", Third ACM Workshop on Role Based Access Control (1998). HTML · "A Resource Access Decision Service for CORBA-based Distributed Systems" (Beznosov, Deng, Blakley, Burt, Barkley, 1999), ACSAC (Annual Computer Security Applications Conference). Postscript · S. Wakid, J.F. Barkley, M.Skall, "Object Retrieval and Access Management in Electronic Commerce", IEEE Communications Magazine, September 1999. HTML Back to Top </div> XML RBAC Administration<a href="javascript:void(0)" class="expandLink" onclick="exp('div','exp4');"><font face="Webdings" color="#999">4</font>Expand List of Documentation</a> <div class="greybox" exp4='yes' style="display:none;">
  • 7. · R.Chandramouli, "Application of XML Tools for Enterprise- Wide RBAC Implementation Tasks" - 5th ACM workshop on Role-based Access Control, July 26-27, 2000, Berlin, Germany. - PDF · R.Chandramouli, Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints, 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI 2003). Best Paper Award! PDF Back to Top Cost/Benefits Analysis <a href="javascript:void(0)" class="expandLink" onclick="exp('div','exp2');"><font face="Webdings" color="#999">4</font>Expand List of Documentation</a> <div class="greybox" exp2='yes' style="display:none;"> · The Economic Impact of Role Based Access Control. Research Triangle Institute. NIST Planning Report 02-01. 2002 PDF · D. Ferraiolo and J.F. Barkley, "Comparing Administrative Cost for Hierarchical and Non-hierarchical Role Representations," Second ACM Workshop on Role-Based Access Control, Nov 6-7, 1997. · J. Barkley, "Comparing Simple Role Based Access Control Models and Access Control Lists" (1997), Second ACM Workshop on Role-Based Access Control. Postscript · "A Marketing Survey of Civil Federal Government Organizations to Determine the Need for RBAC Security Product" (SETA Corporation, 1996). Postscript Back to Top RBAC Web Servers <a href="javascript:void(0)" class="expandLink" onclick="exp('div','exp5');"><font face="Webdings" color="#999">4</font>Expand List of Documentation</a> <div class="greybox" exp5='yes' style="display:none;"> · D.F. Ferraiolo, J. Barkley, D.R. Kuhn, "A Role Based Access Control Model and Reference Implementation within a Corporate Intranet", ACM Transactions on Information Systems
  • 8. Security, Volume 1, Number 2, February 1999. PDFPostscript · D.F. Ferraiolo, J. Barkley,"Specifying and Managing Role- Based Access Control within a Corporate Intranet" (1997), Second ACM Workshop on Role-Based Access Control. PDFPostscript · J. Barkley, A.V. Cincotta, D.F. Ferraiolo, S. Gavrila, , D.R. Kuhn, "Role Based Access Control for the World Wide Web", 20th National Computer Security Conference (1997). PDFPostscript · "Role Based Access Control for the World Wide Web" Slide Presentation Postscript · J. Barkley, D.R. Kuhn, L. Rosenthal, M. Skall, A.V. Cincotta, "Role-Based Access Control for the Web", CALS Expo International & 21st Century Commerce 1998: Global Business Solution s for the New Millennium (1998). HTML </div> Back to Top Detailed Overview Security administration can be costly and prone to error because administrators usually specify access control lists for each user on the system individually. With RBAC, security is managed at a level that corresponds closely to the organization's structure. Each user is assigned one or more roles, and each role is assigned one or more privileges that are permitted to users in that role. Security administration with RBAC consists of determining the operations that must be executed by persons in
  • 9. particular jobs, and assigning employees to the proper roles. Complexities introduced by mutually exclusive roles or role hierarchies are handled by the RBAC software, making security administration easier. This web site explains RBAC concepts, costs vs.benefits and economic impact of RBAC, design and implementation issues, the proposed standard, and advanced research topics. The NIST model for RBAC was adopted as an American National Standard by the American National Standards Institute, International Committee for Information Technology Standards (ANSI/INCITS) on February 11, 2004. See the RBAC Standards Section for more information. PAGE FOOTER STARTS HERE: INFO, CONTACT EMAIL, UPDATE/CREATE DATES