Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/project/resource/index.aspx?aid=17&t=isc-west-2024-news-and-product-updates
INSIGHTS

Nedap research paper "Sorting out role based access control" awarded

Nedap research paper
Researchers of Nedap Security Management have taken another perspective on role based access control, which allows for easier management of identities and authorizations and ultimately enhances organizational scalability.

Managing identities and authorizations in any organization should be simple, regardless the size and scale of the organization. This improves compliance to the security policy, increases security, decreases human errors and saves time. However, Nedap noticed that when organizations and companies grow, the management of identities and authorizations often becomes prohibitively complex as management in this case involves, for example, more areas, more people and more schedules, and therefore more permissions and more access-rules.

Wouter Kuijper and Victor Ermolaev, both researchers of Nedap Security Management, have addressed this problem and demonstrated a solution to overcome complexity and enhance organizational scalability. They first identified a fragment of the popular framework for modelling access control rules, role based access control (RBAC) which allowed them to make an important conceptual step in developing a new form of RBAC particularly well suited to physical access control. Their introduction of polarized, bi-sorted role based access control suggests to treat permissions via demarcations separately from subjects via proper roles, moreover it allows safe and understandable mixing of positive specification style (i.e.: saying who has access) and negative specification style (i.e.: saying who does not have access). In contrast, ‘classic' role based access control does not distinguish proper roles from demarcations and it does not allow the negative specification style to be used. The researchers then propose a third dimension where the two administrative perspectives are linked up, which is access management itself, now recovered on a more manageable abstraction level, and much more suitable to the responsibilities of security officers working in large organizations. The decoupling of the 2 administrative perspectives has several benefits for practitioners working within physical security and ultimately leads to more organizational scalability. Presented at the 2014 ACM Symposium on Access Control Models and Technologies (SACMAT) in London, Ontario the research was awarded the Best Paper Award. The SACMAT symposium is organized by the ACM Special Interest group in Security Audit and Control (SIGSAC). It is the premier forum for researchers advancing the state of the art in access control.

Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to:
Most Viewed Articles