A secure, constraint-aware role-based access control interoperation framework

被引:5
|
作者
Baracaldo N. [1 ]
Masoumzadeh A. [1 ]
Joshi J. [1 ]
机构
[1] School of Information Sciences, University of Pittsburgh
关键词
All Open Access; Green;
D O I
10.1109/ICNSS.2011.6060001
中图分类号
学科分类号
摘要
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that limit the times when the users can access the resources, and separation of duty (SoD) constraints. Existing interoperation solutions do not address such cross-domain temporal access control and SoDs requirements. In this paper, we propose a role-based framework to facilitate secure interoperation among multiple domains by ensuring the enforcement of temporal and SoD constraints of individual domains. To support interoperation, we do not modify the internal policies, as most of the current approaches do. We present experimental results to demonstrate our proposed framework is effective and easily realizable. © 2011 IEEE.
引用
收藏
页码:200 / 207
页数:7
相关论文
共 50 条
  • [21] Implement of Agent with Role-based Hierarchy Access Control for Secure Grouping IoTs
    Chen, Hsing-Chung
    Chang, Chia-Hui
    Leu, Fang-Yie
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 120 - 125
  • [22] Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework
    Nyame, Gabriel
    Qin, Zhiguang
    INFORMATION, 2020, 11 (06)
  • [23] Context-Aware Role-based Access Control in Pervasive Computing Systems
    Kulkarni, Devdatta
    Tripathi, Anand
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 113 - 122
  • [24] A context-aware role-based access control model for Web services
    Shen, HB
    Hong, F
    ICEBE 2005: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2005, : 220 - 223
  • [25] Context-aware role-based access control model for Web services
    Feng, X
    Jun, M
    Hao, H
    Li, X
    GRID AND COOPERATIVE COMPUTING GCC 2004 WORKSHOPS, PROCEEDINGS, 2004, 3252 : 430 - 436
  • [26] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [27] Role-Based Access Control in Retrospect
    Franqueira, Virginia N. L.
    Wieringa, Roel J.
    COMPUTER, 2012, 45 (06) : 81 - 88
  • [28] Role-based access control in DCOM
    Ahn, GJ
    JOURNAL OF SYSTEMS ARCHITECTURE, 2000, 46 (13) : 1175 - 1184
  • [29] Practical Role-Based Access Control
    Galante, Victoria
    INFORMATION SECURITY JOURNAL, 2009, 18 (02): : 64 - 73
  • [30] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    International Journal of Information Security, 2008, 7 : 123 - 136