A secure, constraint-aware role-based access control interoperation framework

被引:5
|
作者
Baracaldo N. [1 ]
Masoumzadeh A. [1 ]
Joshi J. [1 ]
机构
[1] School of Information Sciences, University of Pittsburgh
关键词
All Open Access; Green;
D O I
10.1109/ICNSS.2011.6060001
中图分类号
学科分类号
摘要
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that limit the times when the users can access the resources, and separation of duty (SoD) constraints. Existing interoperation solutions do not address such cross-domain temporal access control and SoDs requirements. In this paper, we propose a role-based framework to facilitate secure interoperation among multiple domains by ensuring the enforcement of temporal and SoD constraints of individual domains. To support interoperation, we do not modify the internal policies, as most of the current approaches do. We present experimental results to demonstrate our proposed framework is effective and easily realizable. © 2011 IEEE.
引用
收藏
页码:200 / 207
页数:7
相关论文
共 50 条
  • [41] A Secure Network Architecture for Heterogeneous IoT Devices using Role-based Access Control
    Jaikla, Tinthid
    Vorakulpipat, Chalee
    Rattanalerdnusorn, Ekkachan
    Hoang Dang Hai
    2019 27TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2019, : 455 - 459
  • [42] Nonlinear Model Predictive Control Based on Constraint-Aware Particle Filtering/Smoothing
    Askari, Iman
    Zeng, Shen
    Fang, Huazhen
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 3532 - 3537
  • [43] Trust-based Secure Cloud Data Storage with Cryptographic Role-based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 62 - 73
  • [44] FORBAC: A flexible organisation and role-based access control model for secure information systems
    Saidani, Oumaima
    Nurcan, Selmin
    ADVANCES IN INFORMATION SYSTEMS, PROCEEDINGS, 2006, 4243 : 364 - 376
  • [45] Defining Role-Based Access Control for a Secure Platform of Unmanned Surface Vehicle fleets
    Laso, Pedro Merino
    Brosset, David
    Giraud, Marie-Annick
    OCEANS 2019 - MARSEILLE, 2019,
  • [46] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
  • [47] Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (11) : 2381 - 2395
  • [48] Specifying role-based access constraints with object constraint language
    Wang, H
    Zhang, YC
    Cao, JL
    Yang, J
    ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 687 - 696
  • [49] A Framework for Risk-Aware Role Based Access Control
    Bijon, Khalid Zaman
    Krishnan, Ram
    Sandhu, Ravi
    2013 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2013, : 462 - 469
  • [50] A framework for implementing role-based access control using CORBA security service
    Beznosov, K
    Deng, Y
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 19 - 30