Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing

被引:0
|
作者
Krishnan, Ram [1 ]
Sandhu, Ravi [1 ]
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
来源
INFORMATION SYSTEMS SECURITY | 2011年 / 7093卷
关键词
Authorization; Enforcement; Equivalence; Security Policy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper. we propose a methodology for incremental security policy specification at varying levels of abstraction while maintaining strict equivalence with respect to authorization state. We specifically consider the recently proposed group-centric secure information sharing (g-SIS) domain. The current specification for g-SIS authorization policy is stateless in the sense that it solely focuses on specifying the precise conditions under which authorization can hold in the system while only considering the history of actions that have occurred. The stateless application policy has been specified using linear temporal logic. In this paper, we develop an enforceable specification that is stateful in the sense that it is defined using specific data structures that are maintained in each state so as to make authorization decisions. We show that the stateful specification is authorization equivalent to that of stateless. That is, in any state, authorization will hold in stateful if and only if it also holds in the stateless specification.
引用
收藏
页码:102 / 115
页数:14
相关论文
共 22 条
  • [1] The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing
    Li, Peiwu
    [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 1223 - 1227
  • [2] Foundations For Group-Centric Secure Information Sharing Models
    Krishnan, Ram
    Sandhu, Ravi
    Niu, Jianwei
    Winsborough, William H.
    [J]. SACMAT'09: PROCEEDINGS OF THE 14TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2009, : 115 - 124
  • [3] Group-Centric Models for Secure and Agile Information Sharing
    Sandhu, Ravi
    Krishnan, Ram
    Niu, Jianwei
    Winsborough, William H.
    [J]. COMPUTER NETWORK SECURITY, 2010, 6258 : 55 - 69
  • [4] Group-Centric Secure Information-Sharing Models for Isolated Groups
    Krishnan, Ram
    Niu, Jianwei
    Sandhu, Ravi
    Winsborough, William H.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (03)
  • [5] A novel group-centric secure information sharing model with trust level considered
    Li, Pei-Wu
    Wang, Wen-Feng
    [J]. International Journal of Wireless and Mobile Computing, 2015, 8 (02) : 194 - 199
  • [6] On Data Provenance In Group-centric Secure Collaboration
    Park, Jaehong
    Nguyen, Dang
    Sandhu, Ravi
    [J]. PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM), 2011, : 221 - 230
  • [7] Group-Centric Networking: Addressing Information Sharing Requirements at the Tactical Edge
    Cheng, Bow-Nan
    Kuperman, Greg
    Deutsch, Patricia
    Mercer, Logan
    Narula-Tam, Aradhana
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (10) : 145 - 151
  • [8] Authorization Models for Secure Information Sharing: A Survey and Research Agenda
    Salim, Farzad
    Reid, Jason
    Dawson, Ed
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (02): : 69 - 87
  • [9] XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
    Mohamed, Aya
    Auer, Dagmar
    Hofer, Daniel
    Kueng, Josef
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 442 - 449
  • [10] The Shadow of the Politics of Deservedness? The Implications of Group-Centric Policy Context for Environmental Policy Implementation Inequalities in the United States
    Liang, Jiaqi
    [J]. JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY, 2016, 26 (03) : 552 - 570