You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/220426872

Security models for Web-based applications

Article  in  Communications of the ACM · February 2001


DOI: 10.1145/359205.359224 · Source: DBLP

CITATIONS READS

235 3,354

4 authors:

James B. D. Joshi Walid G. Aref


University of Pittsburgh Purdue University
197 PUBLICATIONS   5,332 CITATIONS    287 PUBLICATIONS   8,802 CITATIONS   

SEE PROFILE SEE PROFILE

Arif Ghafoor Eugene Spafford


Purdue University Purdue University
202 PUBLICATIONS   6,034 CITATIONS    251 PUBLICATIONS   8,540 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Processing of spatiotemporal queries View project

Human Resilience for Cybersecurity View project

All content following this page was uploaded by James B. D. Joshi on 04 June 2014.

The user has requested enhancement of the downloaded file.


SECURITY MODELS FOR
WEB-BASED
APPLICATIONSUsing traditional and emerging access control approaches to
develop secure applications for the Web.
The rapid proliferation of the ure, which includes a Web client, net-
Internet and the cost-effective growth work servers, and a back-end informa-
of its key enabling technologies are James B.D. Joshi, tion system supported by a suite of
revolutionizing information technol- databases. For transaction-oriented
ogy and creating unprecedented Walid G. Aref, applications, such as e-commerce, mid-
opportunities for developing large- dleware is usually provided between the
scale distributed applications. At the Arif Ghafoor, network servers and back-end systems
same time, there is a growing concern to ensure proper interoperability.
over the security of Web-based appli- and Eugene H. Considerable security challenges and
cations, which are rapidly being vulnerabilities exist within each compo-
deployed over the Internet [4]. For Spafford nent of this architecture. Existing pub-
example, e-commerce—the leading lic-key infrastructures (PKIs) provide
Web-based application—is projected encryption mechanisms for ensuring
to have a market exceeding $1 trillion over the information confidentiality, as well as digital sig-
next several years. However, this application nature techniques for authentication, data
has already become a security nightmare for integrity and non-repudiation [11]. As no
both customers and business enterprises as access authorization services are provided in
indicated by the recent episodes involving this approach, it has a rather limited scope for
unauthorized access to credit card information. Web-based applications.
Other leading Web-based applications with con- The strong need for information security on
siderable information security and privacy issues the Internet is attributable to several factors, includ-
include telemedicine-based health-care services and ing the massive interconnection of heterogeneous and
online services or businesses involving both public distributed systems, the availability of high volumes
and private sectors. Many of these applications are of sensitive information at the end systems main-
supported by workflow management systems tained by corporations and government agencies, easy
(WFMSs) [1]. A large number of public and private distribution of automated malicious software by
enterprises are in the forefront of adopting Internet- malfeasors, the ease with which computer crimes can
based WFMSs and finding ways to improve their be committed anonymously from across geographic
services and decision-making processes, hence we boundaries, and the lack of forensic evidence in com-
are faced with the daunting challenge of ensuring puter crimes, which makes the detection and prose-
the security and privacy of information in such cution of criminals extremely difficult.
Web-based applications [4]. Two classes of services are crucial for a secure
Typically, a Web-based application can be repre- Internet infrastructure. These include access control
sented as a three-tier architecture, depicted in the fig- services and communication security services. Access

38 February 2001/Vol. 44, No. 2 COMMUNICATIONS OF THE ACM


control services protect Internet resources from unau- in serious security breaches, as the content provider
thorized use, whereas communication security ser- can exploit browser vulnerabilities by sending mali-
vices ensure confidentiality and integrity of data cious executable code or by overwhelming the system
transmitted over the network, in addition to non- by pushing a high volume of information.
repudiation of services to the communicating entities. Network servers are the places where most network
An important prerequisite for access control is user services are located, such as the Web server, the mail
authentication, the process that establishes the iden- server, and so forth. Firewall technology has become
tity of a user. In the context of the Internet, we the most popular defense for these servers against the
assume authentication is handled by the communica- open untrusted Internet, as depicted in Figure 1.
tion security services. Though firewalls can prevent illegitimate traffic from
traveling from the Internet to corporate networks,
legitimate requests that pass through a firewall may
be used for a data-driven attack on the networks or
back-end systems [4, 5]. Configuration of firewalls
and network servers is a formidable and error-

prone task. This emphasizes the


need to restrict or reduce complexity
Security in the Web Environment at the firewalls and networks and
End users are exposed to several security and privacycomplement firewalls with robust
risks when using Web browsers, and browser vul- host-based security.
nerabilities can result in compromising the security In large corporate intranets, the
of a Web client [4]. Information about a user such insider attack is a growing security con-
as login name or machine name can be collected cern. A joint study on computer crimes conducted by
and used to profile the user, thus raising serious pri-
the Computer Security Institute (CSI) and the FBI
vacy concerns. Cookies, the data stored on the indicates that the most serious losses in enterprises
client’s machine and exchanged between the Web occur through unauthorized access by insiders, and
client and the Web server to maintain connection 71% of respondents had detected unauthorized access
information, can be used for the purpose of gather- by insiders [6]. Therefore, there is a strong need for
ing such information. A source of vulnerability at developing new access control models or extending
the client site also comes from the use of executablethe existing ones to neutralize security threats and
content on the Web, such as Java applets, ActiveX address the diverse security requirements of Web-
controls, and the like. The current improvement in based applications.
JDK1.2, which allows signed applets, requires the
TERRY MIURA

client to use a security policy for downloadable Justification for Access Control
applets. Many sites also use push technology to Public-key infrastructures have been an important
deliver Web content to clients. This process can result development for addressing the security concerns of

COMMUNICATIONS OF THE ACM February 2001/Vol. 44, No. 2 39


Web applications. Users can be authenticated using or modification of information, whether in storage,
PKI facilities, however, such facilities do not provide processing or transit, and against denial of service to
any mechanism for access control at the end systems. authorized users, including measures necessary to
The fact that insider attacks constitute a consider- detect, document, and counter such threats. The
able threat further accentuates the need for robust main goals of information security are confidential-
host-based security, whereby substantial authentica- ity or secrecy, integrity, availability, accountability,
tion and access control services must be deployed at and assurance. The goal of confidentiality is to
the host. The insider attack threat further demon- ensure the information is not accessed by an unau-
strates a strong need for efficient security manage- thorized person. The goal of information integrity is
ment and administration functions in an enterprise. to protect information from unauthorized modifica-
Host-based security can also help the network tion. Information availability ensures the informa-
servers and firewalls for added intranet security. tion is available when needed and is not made
Security models that allow efficient security man- inaccessible by malicious data-denial activities.
agement and administration can also be extended Information accountability ensures that every action
for multidomain environments, where interactions of an entity can be uniquely traced back to the
entity. Security assurance is the degree of confidence
in the security of the system with respect to prede-
Multilayered architecture for fined security goals.
Web-based applications. Several models have been proposed to address the
Client
access control requirements of distributed applica-
Client
Network server Business logic
(e.g., CGI script)
tions. Traditional access control models are broadly
categorized as discretionary access control (DAC) and
Client Firewall
mandatory access control (MAC) models. New mod-
Internet els such as role-based access control (RBAC) or task-
Client
End system
(Information system)
based access control (TBAC) models have been
B's security domain
proposed to address the security requirements of a
Network server Business logic
(e.g., CGI script) wider range of applications. We briefly highlight the
Firewall
main differences among these models and provide an
Client-to-business
Access control policy
Business-to-business
Access control policy
assessment of their suitability for supporting Web-
based applications.
End system
(Information system)
A's security domain
Discretionary Access Control (DAC)
Model
among heterogeneous policy domains are intensive. In DAC models, all the subjects and objects in a sys-
Typical applications of multidomain environments tem are enumerated and the access authorization
include e-commerce, corporate databases, and digi- rules for each subject and object in the system are
tal government. Such applications need to intercon- specified. Subjects can be users, groups, or processes
nect and interoperate their business logic while that act on behalf of other subjects. If a subject is the
protecting sensitive information. owner of an object, the subject is authorized to grant
The Web primarily uses a hypertext approach for or revoke access rights on the object to other subjects
information dissemination. With the growth of at his discretion. DAC policies are flexible and the
e-commerce applications, the Web is rapidly being most widely used for Web-based applications. How-
transformed into an activity- or transaction-intensive ever, these policies do not provide high security
environment. Security models for hypertext-based assurance. For example, DAC allows copying of data
systems are rare and still in their infancy stages. For from one object to another, which can result in
the Web, access models and mechanisms should facil- allowing access to a copy of data to a user who does
itate dynamic changes in the content and context of not have access to the original data. Such risks can
information, allow monitoring of the state of the sys- propagate to the entire Web environment, causing
tem, and facilitate carrying out transactional activi- serious violation of security goals.
ties. Existing access models lack these features. Among the existing representations of DAC mod-
els, a noticeable one is the HRU (Harrison, Ruzzo
Access Control Models and Ullman) access control matrix (ACM) model [5].
Information systems security refers to protection of The matrix specifies access rights of subjects for
information systems against unauthorized access to accessing objects in the system. In conjunction with

40 February 2001/Vol. 44, No. 2 COMMUNICATIONS OF THE ACM


ACM, the HRU model uses a set of commands to Unlike DAC, MAC models provide more robust
construct the overall authorization scheme. Safety in protection mechanisms for data, and deal with more
HRU is in general undecidable. The basic safety specific security requirements, such as an information
problem is to determine whether there exists a reach- flow control policy [8]. However, enforcement of
able state in which a particular subject possesses a par- MAC policies is often a difficult task, and in particu-
ticular privilege that it did not previously possess. lar for Web-based applications, they do not provide
Several new models have recently been proposed for viable solutions because they lack adequate flexibility.
systems for which safety problems are decidable and Furthermore, organizational security needs are often a
tractable. Most of these models are based on the mixture of policies that may need to use both DAC
notion of security type, and include the Schematic and MAC models, which necessitates seeking solu-
Protection Model (SPM), the Typed Access Matrix tions beyond those provided by DAC and MAC
(TAM) model, and the Dynamically Typed Access models only. Originally, these models were not
Control (DTAC) model [7]. Unlike SPM and TAM, intended for Web-based applications. In particular,
which have subject types and object types, DTAC their design philosophy was not intended to serve
makes no distinction between subjects and objects. hypertext-based systems, which is common in a Web-
The DTAC model uses a dynamic typing mechanism based environment. The hypertext information
that makes it suitable for a dynamic environment such model uses special objects such as links, frames or
as the Internet. In DTAC, a safety invariant is main- slots, document nodes, and so forth, all of which need
tained by carrying out static analysis and dynamic to be protected [2]. Hypertext systems are character-
checks on the security aspects of the system. This fea- ized by three features, which include information
ture gives DTAC the power to model task-based secu- about the connections among data items, their
rity [7]. By grouping entities into types, this model can unique navigational aspects, and the absence of a
reduce the size of the configuration and can enhance schema. Although extensions enabling these models
the administrative functions. While these extensions to address security concerns have been proposed in
are intended to broaden the scope of ACM-based the literature, more challenging issues such as control
models, they are still in the theoretical development of copy and dissemination of information, active
stage, with little or no experimental results. object management, and support for multiple data
types and complex interrelationships have yet to be
Mandatory Access Control (MAC) Model explored in order to develop viable solutions for Web-
In a MAC model, all subjects and objects are classi- based applications.
fied based on predefined sensitivity levels that are
used in the access decision process. An important Role-based Access Control (RBAC)
goal of a MAC model is to control information flow Model
in order to ensure confidentiality and integrity of Role-based access control (RBAC) models are
the information, which is not addressed by DAC receiving increased attention as a generalized
models. For example, to ensure information confi- approach to access control because they provide sev-
dentiality in defense applications, a MAC model can eral well-recognized advantages [7]. As roles repre-
be implemented using a multilevel security mecha- sent organizational responsibilities and functions, a
nism that uses no read-up and no write-down rules, role-based model directly supports arbitrary, organi-
also known as Bell-LaPadula restrictions. These rules zation-specific security policies. The RBAC models
are designed to ensure that information does not have been shown to be “policy-neutral” [7] in the
flow from a higher sensitivity level to a lower sensi- sense that using role hierarchies and constraints, a
tivity level. To achieve information integrity, the wide range of security policies can be expressed,
access rules are formulated as no-read-down and no- including traditional DAC and MAC, and user-spe-
write-up [8]. The goal in this case is not to allow the cific ones. Security administration is also greatly
flow of low integrity information to high integrity simplified by the use of roles to organize access priv-
objects. The Chinese Wall policy, which addresses ileges. For example, if a user moves to a new func-
conflict of interest issues relevant to financial indus- tion within the organization, the user can simply be
tries, can also be implemented using a MAC model assigned to the new role and removed from the old
[8]. For Web-based applications, multilevel classifi- one, whereas in the absence of an RBAC model, the
cation of information may be an essential require- user’s old privileges would have to be individually
ment that can be enforced by a service provider to revoked, and new privileges would have to be
distinguish among the users and the type of infor- granted. Special administrative roles can be desig-
mation being accessed. nated to manage other roles. Such administrative

COMMUNICATIONS OF THE ACM February 2001/Vol. 44, No. 2 41


roles can be hierarchically organized to provide a Web requires specific software in the client machine.
well-organized security management structure, The I-RBAC (RBAC for an intranet) model [9] uses
which is desirable in large Web-based enterprises software agents to distinguish between the local role
where security management becomes a complex hierarchies and the global role hierarchy of the entire
task. Several authorization-constraints may need to intranet. The local network objects are known only to
be enforced in an organization to protect informa- the local servers, whereas the global network objects
tion misuse and prevent fraudulent activities. A typ- are known throughout the intranet. Information
ical authorization constraint, which is relevant and about mapping between the global roles and local
well-known in the security area, is separation of roles is kept in a database and is used when a global
duties (SOD). Reducing the risk of fraud by not network object needs to access an object on another
allowing any individual to have sufficient authority server. The disadvantage of I-RBAC is that maintain-
within the system to single-handedly perpetrate ing consistent information about the roles becomes
fraud is the intent of SOD. Such constraints can be difficult as the number of roles increases.
easily expressed using an RBAC model through A key feature of RBAC is its potential support for
SOD constraints on roles, user-role assignments and a multidomain environment, which makes it an
role-privilege assignments. Furthermore, using attractive candidate for Web-based applications.
assigned roles, users can sign on with the least priv- Role-hierarchy mapping between two RBAC-based
ilege set required for any access. In case of inadver- policy domains can be used to define a metapolicy for
tent errors, such least privilege assignment can secure interoperation.
ensure minimal damage.
An important consideration in RBAC systems is Access Control Models for Tasks and
the possible temporal constraints that may exist on Workflows
roles, such as the time and duration of role activa- The models discussed previously use the subject-
tions, and timed-triggering of a role by an activation object view toward security. These models have a
of another role [7]. Using an RBAC model is a highly limited scope and are not flexible enough to allow
desirable goal for addressing the key security require- access policies based on the content of information
ments of Web-based applications in general, and or the nature of tasks/transactions in a WFMS.
WFMSs in particular. Roles can be assigned to work- WFMSs have emerged as a key technology for
flow tasks so that a user with any of the roles related enabling activity-intensive Web applications that
to a task may be authorized to execute it. However, require extensive automated transactional functions.
the challenge is to develop a robust RBAC framework Such applications typically constitute a complex mix
to handle the complex security needs of a WFMS, of tasks and transactions that span departmental,
where temporal, nontemporal, and dependency con- organizational, geographical and cultural bound-
straints among roles and tasks exist. aries, further exacerbating the complexity of Web
A recent implementation of an RBAC system for security. Although there exists a pressing need to
the Web environment (RBAC/Web) has been develop access control models that can provide
reported in [3]. The implementation consists of a strong support for activity and task-intensive appli-
Web server to enforce RBAC policies and an admin- cations, no existing access control models have the
istrative tool to allow security administration. The capability to address the major security issues related
system places no requirements on the browser. When to these applications.
a user issues an access request, a role is assigned to the Several authorization models related to WFMSs
requester after establishing a session using the avail- have been proposed. A viable approach to enforce
able authentication and confidentiality services. arbitrary security requirements during the execution
These services include the Secure Socket Layer (SSL), of workflow tasks is to assign roles to workflow tasks
Secure HTTP (SHTTP), and an authentication [1]. The workflow tasks of Web-based applications
mechanism that uses username/passwords. To ensure can be distributed over multiple heterogeneous secu-
better administration, RBAC/Web can be integrated rity domains, and may have strict temporal and inter-
with an administrative model such as URA97 (User- task dependency constraints. In addition, roles
Role Assignment ‘97), which uses administrative roles assigned to tasks may have their own temporal and
to manage other roles. nontemporal constraints that may be static or
Several other RBAC implementations have been dynamic in nature. Although the use of an RBAC
developed, including the hyperDrive System devel- framework for ensuring workflow security has been
oped by the Internal Revenue Service, TrustedWeb, proposed in the literature, substantial extensions are
getAccess by enCommerce, and SESAME. Trusted- needed to address security issues related to Web

42 February 2001/Vol. 44, No. 2 COMMUNICATIONS OF THE ACM


applications and WFMSs. Approaches and features compared.
To address the security issues
related to task-oriented systems Appraoch Features from Web Perspective
and to effectively serve the DAC • Ownership-based, flexible, most widely used, does not provide
unique needs of such systems, high degree of security, and hence low assurance
researchers in [10] propose a fam- • Typed versions such as SPM, TAM, and DTAC are expressive but
have little or no experience base
ily of task-based access control • DTAC can handle dynamic changes and task-based control
(TBAC) models that constitutes (better than RBAC)
four models arranged in form of • Most cannot be used where classification levels are needed
a hierarchy. The TBAC0 model • Typed versions have tried to include classification levels
represents the base model that MAC • Administration-based
provides the basic or the mini- • Information flow control rules
mum facilities, such as tasks, • High level of security, and hence high assurance, but less flexible
authorization steps, and their RBAC • Policy-neutral/flexible
dependencies. The TBAC1 • Principle of least privilege
model is an extension of TBAC0 • Separation of duty
• Easy administrative features
that includes the composite • Able to express DAC, MAC, and user-specific policies using role
authorizations of two or more hierarchy and constraints
authorization steps. The TBAC2 • Can be easily incorporated into current technologies
• Good for multidomain environments when policies are expressed
model is another extension of using role hierarchies and constraints
TBAC0 that allows both static
and dynamic constraints. The Access control • Task-oriented authorization paradigm
Tasks/Workflow • RBAC is highly beneficial for WFMS
TBAC3 model is a consolidated • TBAC is at an initial stage of development (no formalism yet)
model that has features of both • A key component for success of transaction-intensive e-commerce,
the TBAC1 and TBAC2 models. medical applications, and so forth

Hypertext-based • Approach based on hypertext model or document characterization-


Agent-based Approach authorizations infancy stage
With the increase of Internet • Essential for providing formal base for the security of Web objects in-
applications, software agents are cluding links and nodes; access modes include browsing and viewing
becoming popular as an emerg- Certificate-based • Utilization of existing PKI facilities
ing system-building paradigm. • Complements the host's access control model
This paradigm can be effectively • Can use trust centers in the Web
used to provide security features Agents • Adaptability and mobility
for Web applications. An agent • Mobile agents introduce new security issues
is a process characterized by • Can be considered a complementary system-building paradigm, rather
than a model or mechanism for specific security implementation
adaptation, cooperation, auton- • May be useful in multidomain environments (for example, for
omy, and mobility. Some agent policy negotiation)
communication language can be
used to negotiate policies during
conflicts for secure interoperation among participat- facility can be used for enforcing access control in
ing policy domains. Agents can be assigned security the Web environment. An example is the use of an
enforcement tasks at the servers and client machines. extended X.509 certificate that carries role informa-
Although mobility and adaptability are essential to tion about a user [7]. These certificates are issued by
the efficient use of Internet resources, they pose sev- a certification authority that acts as a trust center in
eral security threats. For example, an agent can the global Web environment.
engage in malicious behavior, thus disrupting nor- The use of public-key certificates is suitable for sim-
mal operation of the host. Similarly, a host may be ple applications. These techniques can be used to
able to affect the activity of an agent by denying either support a host’s access control method by carry-
required access to local information resources. ing access control information or provide a separate
access control mechanism based on trust centers.
Certificate-based Approach
Public-key infrastructure technology is maturing, Discussion
and the use of PKI certificates is expected to be ubiq- We have discussed several access control models and
uitous in the near future. Certificates issued by a PKI approaches that can be used to disseminate and

COMMUNICATIONS OF THE ACM February 2001/Vol. 44, No. 2 43


exchange information securely, and allow secure exe- Conclusion
cution of WFMSs. However, comprehensive frame- We have presented a comparative assessment of
works are needed to address the multifaceted existing security models in terms of supporting
security issues related to Web-based applications. In Web-based applications and WFMSs. Although
particular, robust access control models are needed there has been phenomenal growth of Web-based
to allow: controlled access, dissemination and shar- applications on the Internet, access control issues
ing of information based on content, context, or related to Web security have largely been neglected.
time; secure execution of tasks and workflows; The RBAC models are expected to provide a viable
secure interoperation in a dynamic distributed framework for addressing a wide range of security
enterprise environment; and efficient management requirements for large enterprises. However, several
and administration of security. extensions to the existing RBAC models are needed
The table summarizes the key features of each to develop workable solutions to adequately address
access control model and approach discussed here. such needs. c
The DAC and MAC models lack capabilities
needed to support security requirements of emerg- References
ing enterprises and Web-based applications. Newer 1. Bertino, E., Ferrari, E., and Atluri, V. The specification and enforce-
ment of authorization constraints in workflow management systems.
models such as SPM, TAM, and DTAC have the ACM Trans. Info. Syst. Security 2, 1 (Feb. 1999), 65–104.
potential to support Web-based applications. In 2. Bertino, E., Pagani, E., Rossi, G.P., and Samarati, P. Protecting infor-
mation on the Web. Commun. ACM 43, 11 (Nov. 2000), 189–199.
particular, DTAC’s feature of using safety invariants 3. Ferraiolo, D.F., Barkley, J.F., and Kuhn, D.R. A role-based access con-
in a dynamic environment is highly desirable for trol model and reference implementation within a corporate intranet.
dynamic and transaction-intensive workflow-based ACM Trans. Info. Syst. Security 2, 1 (Feb. 1999), 34–64.
4. Garfinkel, S. and Spafford, E.H. Web Security and Commerce. O’Reilly
applications. Hypertext-based authorization models and Associates, Sebastopol, CA, 1997.
are essential for secure composition and distribu- 5. Harrison, M.H., Ruzzo, W.L., and Ullman, J.D. Protection in operat-
ing systems. Commun. ACM 19, 8 (Oct. 1976), 461–471.
tion of complex Web documents. However, these 6. Power, R. Tangled Web: Tales of Digital Crime from the Shadows of
security models are yet to be fully developed and Cyberspace. Que/Macmillan Publishing, Aug. 31, 2000.
assessed for their efficacy and viability to support 7. Proceedings of The Fifth ACM Workshop on Role-based Access Control.
Berlin, Germany, Jul. 2000.
Web-based applications. 8. Sandhu, R. Lattice-based access control models. IEEE Computer 26, 11
Achieving secure interoperation in a heteroge- (1993).
9. Tari, Z. and Chan, S. A role-based access control for intranet security.
neous Web environment is a difficult task, because IEEE Internet Computing (Sept.–Oct. 1997), 24–34.
of the inherent dynamism and evolving security 10. Thomas, R.K. and Sandhu, R.S. Task-based authorization controls
requirements of the underlying autonomous (TBAC): A family of models for active and enterprise-oriented autho-
rization management. In Proceedings of the IFIP WG11.3 Workshop on
administrative domains. Using RBAC models and Database Security (Lake Tahoe, CA, Aug. 1997).
software security agents are suitable approaches for 11. Wing, P. and O’Higgins, B. Using public-key infrastructure for secu-
such environments. The RBAC models have sev- rity and risk management. IEEE Communications Magazine, (Sept.
1999), 71–73.
eral desirable features such as flexibility, policy-
neutrality, better support for security management
and administration, the principle of least privilege, James B.D. Joshi (joshij@ecn.purdue.edu) is a graduate student
and other aspects that make them attractive candi- in the School of Electrical and Computer Engineering at Purdue
dates for developing secure Web-based applica- University in West Lafayette, IN.
Walid Aref (aref@cs.purdue.edu) is an associate professor in the
tions. In addition, they can represent traditional Department of Computer Science at Purdue University in West
DAC and MAC as well as user-defined or organi- Lafayette, IN.
zation-specific security policies. Furthermore, an Arif Ghafoor (ghafoor@ecn.purdue.edu) is a professor in the
RBAC model provides a natural mechanism for School of Electrical and Computer Engineering at Purdue University
in West Lafayette, IN.
addressing the security issues related to the execu- Eugene H. Spafford (spaf@cerias.purdue.edu) is a professor and
tion of tasks and workflows. A key advantage of the director of the Center for Education and Research in Information
RBAC models is the ease of their deployment over Assurance and Security (CERIAS) at Purdue University in West
the Internet. The use of RBAC in conjunction Lafayette, IN.
with PKI facilities can provide a pragmatic
This work has been supported by a grant from CERIAS, Purdue University.
approach to addressing issues related to security of
distributed Web-based applications and WFMSs. Permission to make digital or hard copies of all or part of this work for personal or class-
room use is granted without fee provided that copies are not made or distributed for
The TBAC models represent efforts toward finding profit or commercial advantage and that copies bear this notice and the full citation on
effective security solutions for the unique needs of the first page. To copy otherwise, to republish, to post on servers or to redistribute to
lists, requires prior specific permission and/or a fee.
task-based systems. However, they are still in the
early stages of development. © 2001 ACM 0002-0782/01/0200 $5.00

44 February 2001/Vol. 44, No. 2 COMMUNICATIONS OF THE ACM

View publication stats

You might also like