A secure, constraint-aware role-based access control interoperation framework

被引:5
|
作者
Baracaldo N. [1 ]
Masoumzadeh A. [1 ]
Joshi J. [1 ]
机构
[1] School of Information Sciences, University of Pittsburgh
关键词
All Open Access; Green;
D O I
10.1109/ICNSS.2011.6060001
中图分类号
学科分类号
摘要
With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that limit the times when the users can access the resources, and separation of duty (SoD) constraints. Existing interoperation solutions do not address such cross-domain temporal access control and SoDs requirements. In this paper, we propose a role-based framework to facilitate secure interoperation among multiple domains by ensuring the enforcement of temporal and SoD constraints of individual domains. To support interoperation, we do not modify the internal policies, as most of the current approaches do. We present experimental results to demonstrate our proposed framework is effective and easily realizable. © 2011 IEEE.
引用
收藏
页码:200 / 207
页数:7
相关论文
共 50 条
  • [1] Trust and role based access control for secure interoperation ("TracSI")
    Phoomvuthisam, Suronapee
    [J]. 2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1458 - 1463
  • [2] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [3] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Calo, Seraphin B.
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (04) : 35 - 43
  • [4] Consistency maintenance for constraint in role-based access control model
    Wei-li Han
    Gang Chen
    Jian-wei Yin
    Jin-xiang Dong
    [J]. Journal of Zhejiang University-SCIENCE A, 2002, 3 (3): : 292 - 297
  • [5] Consistency maintenance for constraint in role-based access control model
    韩伟力
    陈刚
    董金祥
    尹建伟
    [J]. Journal of Zhejiang University-Science A(Applied Physics & Engineering), 2002, (03) : 43 - 48
  • [6] PuRBAC: Purpose-Aware Role-Based Access Control
    Masoumzadeh, Amirreza
    Joshi, James B. D.
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2008, PT II, PROCEEDINGS, 2008, 5332 : 1104 - 1121
  • [7] A Trust Management Framework for Secure Cloud Data Storage Using Cryptographic Role-Based Access Control
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2013, 2014, 456 : 226 - 251
  • [8] Designing secure e-commerce with role-based access control
    Yang, CG
    Zhang, CN
    [J]. IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 313 - 319
  • [9] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    [J]. COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
  • [10] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200