Title: Supporting dynamic administration of RBAC in web-based collaborative applications during run-time

Authors: Ioannis Mavridis, Andreas Mattas, Ioannis Pagkalos, Isabella Kotini, Christos Ilioudis

Addresses: Department of Applied Informatics, University of Macedonia, 156 Egnatia Street, 54006, Thessaloniki, Greece. ' Informatics Laboratory, Faculty of Technology, Aristotle University of Thessaloniki, 54006, Thessaloniki, Greece. ' Informatics Laboratory, Faculty of Technology, Aristotle University of Thessaloniki, 54006, Thessaloniki, Greece. ' Department of Applied Informatics, University of Macedonia, 156 Egnatia Street, 54006, Thessaloniki, Greece. ' Informatics Laboratory, Faculty of Technology, Aristotle University of Thessaloniki, 54006, Thessaloniki, Greece

Abstract: The requirements for the efficient management of authorisations in web-based collaborative applications lead to new access control administration paradigms during run-time. The need for fine-grained and just-in-time access control can effectively be addressed by dynamic administration of authorisations, via either proper role or permission activation. In this paper, an authorisation architecture that is based on the Dynamically Administering Role-based Access Control (DARBAC) model, and provides access control and meta-access control capabilities, is presented. The paper describes the implementation of the components and the structure of the architecture within the .NET framework. The application of the implemented access control system is also demonstrated. Based on the results of this demonstration, a more detailed investigation of the benefits of the proposed approach, which are related to improvements in the administration of Role-based Access Control (RBAC) during run-time, is presented.

Keywords: information security; meta-access control; role-based access control; dynamically administering RBAC; DARBAC; authorisation management; web collaboration; internet.

DOI: 10.1504/IJICS.2008.022487

International Journal of Information and Computer Security, 2008 Vol.2 No.4, pp.328 - 352

Published online: 09 Jan 2009 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article