Download PDF version Contact company
The 2014 SACMAT is the premier forum for researchers advancing the state of the art in access control
Nedap's research paper demonstrated a solution to overcome complexity and enhance organisational scalability

Researchers of Nedap Security Management have taken another perspective on role based access control, which allows for easier management of identities and authorisations and ultimately enhances organisational scalability. Their research paper “Sorting out role based access control” was awarded the Best Paper Award during the 2014 ACM Symposium on Access Control Models and Technologies (SACMAT), the premier forum for researchers advancing the state of the art in access control.

Managing identities and authorisations in any organisation should be simple, regardless the size and scale of the organisation. This improves compliance to the security policy, increases security, decreases human errors and saves time. However, we noticed that when organisations and companies grow, the management of identities and authorisations often becomes prohibitively complex as management in this case involves, for example, more areas, more people and more schedules, and therefore more permissions and more access-rules.

Wouter Kuijper and Victor Ermolaev, both researchers of Nedap Security Management, have addressed this problem and demonstrated a solution to overcome complexity and enhance organisational scalability. They first identified a fragment of the popular framework for modelling access control rules, role based access control (RBAC) which allowed them to make an important conceptual step in developing a new form of RBAC particularly well suited to physical access control. Their introduction of polarissed, bi-sorted role based access control suggests to treat permissions via demarcations separately from subjects via proper roles, moreover it allows safe and understandable mixing of positive specification style (i.e.: saying who has access) and negative specification style (i.e.: saying who does not have access).

Managing identities and authorisations
in any organisation should be simple,
regardless the size and scale of the
organisation

In contrast, ‘classic’ role based access control does not distinguish proper roles from demarcations and it does not allow the negative specification style to be used. The researchers then propose a third dimension where the 2 administrative perspectives are linked up, which is access management itself, now recovered on a more manageable abstraction level, and much more suitable to the responsibilities of security officers working in large organisations. The decoupling of the 2 administrative perspectives has several benefits for practitioners working within physical security and ultimately leads to more organisational scalability. Presented at the 2014 ACM Symposium on Access Control Models and Technologies (SACMAT) in London, Ontario the research was awarded the Best Paper Award. The SACMAT symposium is organised by the ACM Special Interest group in Security Audit and Control (SIGSAC). It is the premier forum for researchers advancing the state of the art in access control.

Download PDF version Download PDF version

In case you missed it

How can organisations integrate physical security with other systems, such as IT and HR?
How can organisations integrate physical security with other systems, such as IT and HR?

By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations...

How are wearable technologies impacting the security market?
How are wearable technologies impacting the security market?

The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and...

Dahua AI perimeter protection for SMBs
Dahua AI perimeter protection for SMBs

The perimeter of a small and medium-sized business (SMB) property is its first line of defence against intruders. It keeps the premises away from theft, property loss and security...