Go to:
Logótipo
Você está em: Start > Publications > View > How to securely break into RBAC: the BTG-RBAC model
Map of Premises
Principal
Publication

How to securely break into RBAC: the BTG-RBAC model

Title
How to securely break into RBAC: the BTG-RBAC model
Type
Article in International Conference Proceedings Book
Year
2009
Authors
Ferreira, Ana
(Author)
FMUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Chadwick, David
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Zao, Gansen
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Farinha, Pedro
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Correia, Ricardo
(Author)
FMUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications View Authenticus page View ORCID page
Chilro, Rui
(Author)
FCNAUP
View Personal Page You do not have permissions to view the institutional email. Search for Participant Publications Without AUTHENTICUS View ORCID page
Conference proceedings International
Pages: 23-+
Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, 7-11 December 2009
Scientific classification
FOS: Engineering and technology > Other engineering and technologies
Other information
Authenticus ID: P-007-SJN
Abstract (EN): Access control models describe frameworks that dictate how subjects (e.g. users) access resources. In the Role-Based Access Control (RBAC) model access to resources is based on the role the user holds within the organization. RBAC is a rigid model where access control decisions have only two output options: Grant or Deny. Break The Glass (BTG) policies on the other hand are flexible and allow users to break or override the access controls in a controlled and justifiable manner. The main objective of this paper is to integrate BTG within the NEST/ANSI RBAC model in a transparent and secure way so that it can be adopted generically in any domain where unanticipated or emergency situations may occur. The new proposed model, called BTG-RBAC, provides a third decision option BTG, which grants authorized users permission to break the glass rather than be denied access. This can easily be implemented in any application without major changes to either the application code or the RBAC authorization infrastructure, apart from the decision engine. Finally, in order to validate the model, we discuss how the BTG-RBAC model is being introduced within a Portuguese healthcare institution where the legislation requires that genetic information must be accessed by a restricted group of healthcare professionals. These professionals, advised by the ethical committee, have required and asked for the implementation of the BTG concept in order to comply with the said legislation.
Language: English
Type (Professor's evaluation): Scientific
Contact: rchiro@fcna.up.pt
No. of pages: 2
License type: Click to view license CC BY-NC
Documents
File name Description Size
How to securely break into RBAC: the BTG-RBAC model 630.00 KB
Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-08-22 at 06:07:15 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book