Centralized Role-Based Access Control for Federated Multi-Domain Environments

被引:0
|
作者
MUDAR Sarem
机构
[1] School of Software Engineering Huazhong University of Science and Technology
[2] Wuhan 430074 Hubei China
关键词
RBAC(role based access control); federated; multi-domain;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
The secure interaction among multiple security domains is a major concern. In this paper, we highlight the issues of secure interoperability among multiple security domains operating under the widely accepted Role Based Access Control (RBAC) model. We propose a model called CRBAC that easily establishes a global policy for roles mapping among multiple security domains. Our model is based on an extension of the RBAC model. Also, multiple security domains were composed to one abstract security domain. Also roles in the multiple domains are translated to permissions of roles in the abstract security domain. These permissions keep theirs hierarchies. The roles in the abstract security domain implement roles mapping among the multiple security domains. Then, authorized users of any security domain can transparently access resources in the multiple domains.
引用
收藏
页码:1688 / 1692
页数:5
相关论文
共 50 条
  • [41] Trusted Multi-Domain DDoS Detection Based on Federated Learning
    Yin, Ziwei
    Li, Kun
    Bi, Hongjun
    SENSORS, 2022, 22 (20)
  • [42] Collaborative Access Control for Multi-Domain Cloud Computing
    Ben Ayed, Souheil
    Teraoka, Fumio
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2012, E95D (10) : 2401 - 2414
  • [43] An attributable role-based access control for healthcare
    Schwartmann, D
    COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [44] On Multi-Domain Network Slicing Orchestration Architecture and Federated Resource Control
    Taleb, Tarik
    Afolabi, Ibrahim
    Samdanis, Konstantinos
    Yousaf, Faqir Zarrar
    IEEE NETWORK, 2019, 33 (05): : 242 - 252
  • [45] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [46] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [47] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [48] ENHANCING FEDERATED DOMAIN ADAPTATION WITH MULTI-DOMAIN PROTOTYPE-BASED FEDERATED FINE-TUNING
    Zhang, Jingyuan
    Duan, Yiyang
    Niu, Shuaicheng
    Cao, Yang
    Lim, Wei Yang Bryan
    arXiv,
  • [49] Security Policy Integration based on Role-Based Access Control Model in Healthcare Collaborative Environments
    Kuang, Teo Poh
    Ibrahim, Hamidah
    PROCEEDINGS OF KNOWLEDGE MANAGEMENT 5TH INTERNATIONAL CONFERENCE 2010, 2010, : 553 - 559
  • [50] Trusted P2P computing environments with role-based access control
    Park, J. S.
    An, G.
    Chandra, D.
    IET INFORMATION SECURITY, 2007, 1 (01) : 27 - 35