Award Winning Research: Sorting Out Role Based Access Control

nedapResearchers of Nedap Security Management have taken another perspective on role based access control, which allows for easier management of identities and authorizations and ultimately enhances organizational scalability. Their research paper “Sorting out role based access control” was awarded the Best Paper Award during the 2014 ACM Symposium on Access Control Models and Technologies (SACMAT), the premier forum for researchers advancing the state of the art in access control.

Managing identities and authorizations in any organization should be simple, regardless the size and scale of the organization. This improves compliance to the security policy, increases security, decreases human errors and saves time. However, we noticed that when organizations and companies grow, the management of identities and authorizations often becomes prohibitively complex as management in this case involves, for example, more areas, more people and more schedules, and therefore more permissions and more access-rules.

Wouter Kuijper and Victor Ermolaev, both researchers of Nedap Security Management, have addressed this problem and demonstrated a solution to overcome complexity and enhance organizational scalability. They first identified a fragment of the popular framework for modelling access control rules, role based access control (RBAC) which allowed them to make an important conceptual step in developing a new form of RBAC particularly well suited to physical access control. Their introduction of polarized, bi-sorted role based access control suggests to treat permissions via demarcations separately from subjects via proper roles, moreover it allows safe and understandable mixing of positive specification style (i.e.: saying who has access) and negative specification style (i.e.: saying who does not have access). In contrast, ‘classic’ role based access control does not distinguish proper roles from demarcations and it does not allow the negative specification style to be used.

The researchers then propose a third dimension where the 2 administrative perspectives are linked up, which is access management itself, now recovered on a more manageable abstraction level, and much more suitable to the responsibilities of security officers working in large organizations. The decoupling of the 2 administrative perspectives has several benefits for practitioners working within physical security and ultimately leads to more organizational scalability. Presented at the 2014 ACM Symposium on Access Control Models and Technologies (SACMAT) in London, Ontario the research was awarded the Best Paper Award. The SACMAT symposium is organized by the ACM Special Interest group in Security Audit and Control (SIGSAC). It is the premier forum for researchers advancing the state of the art in access control.

You can read the full findings here.

About Security Buyer

Security Buyer is the leading authority in global security content, delivering expert news, in-depth articles, exclusive interviews, and industry insights across print, digital, and event platforms. Published 10 times a year, the magazine is a trusted resource for professionals seeking updates and analysis on the latest developments in the security sector.

To submit an article, or for sponsorship opportunities, please contact our team below.

Rebecca Spayne picture 2025

Rebecca Spayne

Managing
EDITOR

Georgina Turner image

Georgina Turner

Sales
Manager

Afua Akoto image - Security Buyer

Afua Akoto

Marketing Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Nedap

Nedap introduces uPASS Go

Nedap is proud to introduce uPASS Go: the next generation reader in long-range vehicle access control. As the latest addition to Nedap’s…
access

Six risks of an outdated access control system

Manufacturers are negligent in informing companies about their outdated access systems. The result is that too many companies…

Outdated access control systems

If manufacturers are careless and fail to inform businesses about access control systems being out of date, it is not just security which becomes a problem.
Nedap

Product Spotlight – Nedap

Nedap’s latest benchmark report explores the future of physical access control and the many commercial benefits it can bring 
Nedap

Nedap enhanced AEOS Locker Management

Nedap Security Management introduces AEOS Locker Management a flexible, intuitive, and intelligent solution to the growing demand for safe
Nedap-GIT Security

Nedap leads the way in global standardisation as GIT Security Award finalist

Nedap’s Global Client Programme is in the final of this year’s GIT Security Awards and will be showcased using augmented reality at IFSEC 2019

Nedap leads the way in global standardisation as GIT Security Award finalist

Nedap’s Global Client Programme is finalist for GIT Security Awards and will be showcased using augmented reality at IFSEC 2019.

Deliveroo chooses AEOS by Nedap for security that can keep pace with its global growth

Deliveroo has chosen AEOS access control by Nedap to protect its staff across the world. Hunter Group will install AEOS at around 50 more Deliveroo sites.

IndigoVision are excited to release a new Access Control Integration with Nedap

The new IndigoVision Nedap AEOS Integration allows events from Nedap AEOS systems to be seamlessly combined with IndigoVision’s management solution.
IndigoVision

IndigoVision are excited to release a new Access Control Integration with Nedap

The new IndigoVision Nedap AEOS Integration allows events from Nedap AEOS systems to be seamlessly combined with IndigoVision’s management solution.
Scroll to Top