A Directed Acyclic Graph based Detection for RBAC Based Secure Interoperation

被引:0
|
作者
Chen, Xiyuan [1 ]
Zhu, Miaoliang [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Zhejiang, Peoples R China
关键词
Directed Acyclic Graph; RBAC; Security Interoperation; Conflict Detection;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Collaboration enables domains to share resources effectively; however it introduces several security and privacy challenges. To guarantee the secure interoperation in complex distributed environment, a RBAC based secure interoperation model was proposed. Based on the inherent characteristic of the RBAC system, a directed acyclic graph based detection method of security violation was investigated. We also classified the conflicts according to the feature of each four parts of NITS RBAC model: conflicts resulting from unrelated roles, conflicts that arise from related roles and conflicts due to separation of duty. The targeted detection method for different types of conflicts was illustrated systematically. Therefore corresponding detection method can be applied to different types of conflicts according to the actual application environment. Furthermore, we analyzed the algorithmic complexity of the method and demonstrated the application of the directed acyclic graph based detection method with case studies in realistic scenarios.
引用
收藏
页码:990 / 995
页数:6
相关论文
共 50 条
  • [1] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
  • [2] A security violation detection method for RBAC based interoperation
    Chen Xiyuan
    Di, Wu
    Jian, Li
    Zhu Miaoliang
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1491 - 1496
  • [3] Provable secure consensus mechanism based on the directed acyclic graph and stake
    Luo Y.
    Guan P.
    Tian H.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2023, 50 (02): : 125 - 137
  • [4] Security violation detection for RBAC based interoperation in distributed environment
    Wang, Xinyu
    Sun, Jianling
    Yang, Xiaohu
    Huang, Chao
    Wu, Di
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2008, E91D (05) : 1447 - 1456
  • [5] Inconsistency Resolution Method for RBAC Based Interoperation
    Huang, Chao
    Sun, Jianling
    Wang, Xinyu
    Wu, Di
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (05): : 1070 - 1079
  • [6] A Delegation Model Based on Directed Acyclic Graph
    Zhang, Xiujuan
    Zhang, Dianming
    Zhang, Yuanke
    Wu, Junhua
    COMMUNICATIONS AND INFORMATION PROCESSING, PT 2, 2012, 289 : 265 - +
  • [7] Network Intrusion Detection Based on Directed Acyclic Graph and Belief Rule Base
    Zhang, Bang-Cheng
    Hu, Guan-Yu
    Zhou, Zhi-Jie
    Zhang, You-Min
    Qiao, Pei-Li
    Chang, Lei-Lei
    ETRI JOURNAL, 2017, 39 (04) : 592 - 604
  • [8] Secure interoperation in a multidomain environment employing RBAC policies
    Shafiq, B
    Joshi, JBD
    Bertino, E
    Ghafoor, A
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (11) : 1557 - 1577
  • [9] A Parallel Programming Pattern based on Directed Acyclic Graph
    Meng, Zheng
    Lin, Ying
    Kang, Yan
    Yu, Qian
    SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2165 - 2169
  • [10] Decentralized Directed acyclic graph based DLT Network
    Saad, A.
    Park, Soo Young
    INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 158 - 163