A Persona Framework for Attribution, Delegation and Least Privilege

被引:0
|
作者
Chandersekaran, Coimbatore S. [1 ]
Simpson, William R. [1 ]
机构
[1] Inst Def Anal, 4850 Mark Ctr Dr, Alexandria, VA 22311 USA
关键词
Delegation; enterprise; information security; least privilege; attribution; information sharing; SECURITY MODEL; RBAC;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
There are many business needs for implementing delegation in IT systems. However, existing approaches to delegation in IT systems are limited in their usability, flexibility, and capability to implement least privilege. The result is that delegation is either not implemented or is implemented informally (e.g. by sharing credentials between users), resulting in serious security concerns and a lack of accountability and auditability. This paper describes a proposed framework for delegation based on the persona concept. A persona is a special category of user that embodies only delegated privileges, and which is explicitly assumed only after the "real" human user taking on that persona explicitly chooses it. This paper describes the persona delegation framework in the context of a large enclave-based architecture currently being implemented by the US Air Force. Benefits of the framework include increased flexibility to handle a number of different delegation business scenarios, decreased complexity of the solution, and greater accountability with only a modest amount of additional infrastructure required.
引用
收藏
页码:84 / 89
页数:6
相关论文
共 50 条
  • [31] Resolving least privilege violations in software architectures
    Buyens, Koen
    De Win, Bart
    Joosen, Wouter
    2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 9 - 16
  • [32] Role-based privilege management using attribute certificates and delegation
    Ahn, GJ
    Shin, D
    Zhang, LH
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 100 - 109
  • [33] Secure access privilege delegation using attribute-based encryption
    Panda, Suryakanta
    Mondal, Samrat
    Das, Ashok Kumar
    Susilo, Willy
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1261 - 1276
  • [34] Authorization with security attributes and privilege delegation - Access control beyond the ACL
    Sameshima, Y
    Kirstein, P
    COMPUTER COMMUNICATIONS, 1997, 20 (05) : 376 - 384
  • [35] Secure access privilege delegation using attribute-based encryption
    Suryakanta Panda
    Samrat Mondal
    Ashok Kumar Das
    Willy Susilo
    International Journal of Information Security, 2023, 22 : 1261 - 1276
  • [36] Persona: A High-Performance Bioinformatics Framework
    Byma, Stuart
    Whitlock, Sam
    Flueratoru, Laura
    Tseng, Ethan
    Kozyrakis, Christos
    Bugnion, Edouard
    Larus, James
    2017 USENIX ANNUAL TECHNICAL CONFERENCE (USENIX ATC '17), 2017, : 153 - 165
  • [37] Rule based constrained delegation framework
    Yin, Gang
    Wang, Huai-Min
    Shi, Dian-Xi
    Teng, Meng
    Jisuanji Xuebao/Chinese Journal of Computers, 2007, 30 (09): : 1511 - 1519
  • [38] Handling least privilege problem and role mining in RBAC
    Huang, Hejiao
    Shang, Feng
    Liu, Jinling
    Du, Hongwei
    JOURNAL OF COMBINATORIAL OPTIMIZATION, 2015, 30 (01) : 63 - 86
  • [39] Determination and Enforcement of Least-Privilege Architecture in Android
    Hammad, Mahmoud
    Bagheri, Hamid
    Malek, Sam
    2017 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE (ICSA 2017), 2017, : 59 - 68
  • [40] Automated Detection of Least Privilege Violations in Software Architectures
    Scandariato, Riccardo
    Buyens, Koen
    Joosen, Wouter
    SOFTWARE ARCHITECTURE, 2010, 6285 : 150 - 165