Migrating from DAC to RBAC

Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

Role Based Access Control (RBAC) is one of the most popular means for enforcing access control. One of the main reasons for this is that it is perceived as the least expensive configuration with respect to security administration. In this paper, we demonstrate that security administration is not always cheaper under RBAC when compared to the traditional Discretionary Access Control (DAC). If RBAC proves to be beneficial, organizations may choose to migrate from DAC to RBAC. There have been many algorithms developed to generate RBAC configurations from DAC configuration. Although these algorithms provide an RBAC configuration, the quality of the generated RBAC configuration could vary among different algorithms and DAC configurations. In this paper, we propose a decision support framework, which provides a basis for comparison among different potential RBAC derivations from DAC to determine the most desirable outcome with respect to the cost of security administration.

Original languageEnglish (US)
Title of host publicationData and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Proceedings
EditorsPierangela Samarati
PublisherSpringer Verlag
Pages69-84
Number of pages16
ISBN (Print)9783319208091
DOIs
StatePublished - 2015
Event29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015 - Fairfax, United States
Duration: Jul 13 2015Jul 15 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9149
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other29th IFIP WG 11.3 Working Conference on Data and Applications Security, DBSec 2015
CountryUnited States
CityFairfax
Period7/13/157/15/15

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Migrating from DAC to RBAC'. Together they form a unique fingerprint.

Cite this