Realization of FGAC Model using XACML Policy Specification

被引:0
|
作者
Shibli, Muhammad Awais [1 ]
Masood, Rahat [1 ]
Habiba, Umme [1 ]
机构
[1] NUST, SEECS, H-12 Campus, Islamabad 44000, Pakistan
关键词
Fine-Grained Access Control; Authorization; eX-tensible Access Control Markup Language; Policy Specification Language; Policy Administration Point; Policy Decision Point; ACCESS-CONTROL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
FGAC model has been adopted by enterprise applications, for the protection of their databases. Most of these deployments are not only limited in purpose but are dependent upon various other factors including query modification algorithms and software development languages. These factors have not only limited their applicability for distributed computing environments but have also affected their widespread adoption and acceptance. Moreover, due to the absence of standard FGAC profile specification, existing FGAC authorization techniques become unsuitable for advance applications such as web 2.0 and cannot be deployed across various platforms, thus fall short of flexibility and customizability. As a result, there is an increasing demand for standard based FGAC specification that could be easily fit into majority of computing environments. In this paper, we bring forth a policy specification (profile) for FGAC model. Our proposed specification is not restricted to database applications only; rather it is generic and flexible enough to be applied on every type of application. It explicates the ways in which organizations would be able to implement standard based fine-grained access control for nearly every application. We present the case-study - a realization of FGAC model based on the proposed policy specification followed by a complete dry-run of policy evaluation procedure.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 50 条
  • [1] Usage Control Model Specification in XACML Policy Language XACML Policy Engine of UCON
    Um-e-Ghazia
    Masood, Rahat
    Shibli, Muhammad Awais
    Bilal, Muhammad
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 68 - 79
  • [2] An automated testing framework of model-driven tools for XACML policy specification
    Bertolino, Antonia
    Daoudagh, Said
    Lonetti, Francesca
    Marchetti, Eda
    2014 9TH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC), 2014, : 75 - 84
  • [3] RSVP policy control using XACML
    Toktar, E
    Jamhour, E
    Maziero, C
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 87 - 96
  • [4] Policy Conflict Management using XACML
    Shamoon, Imran
    Rajpoot, Qasim
    Shibli, Awais
    2012 8TH INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORKING TECHNOLOGY (ICCNT, INC, ICCIS AND ICMIC), 2012, : 287 - 291
  • [5] XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
    Mohamed, Aya
    Auer, Dagmar
    Hofer, Daniel
    Kueng, Josef
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 442 - 449
  • [6] Policy administration control and delegation using XACML and Delegent
    Seitz, L
    Rissanen, E
    Sandholm, T
    Firozabadi, BS
    Mulmo, E
    2005 6TH INTERNATIONAL WORKSHOP ON GRID COMPUTING (GRID), 2005, : 49 - 54
  • [7] XACBench: a XACML policy benchmark
    Ahmadi, Shayan
    Nassiri, Mohammad
    Rezvani, Mohsen
    SOFT COMPUTING, 2020, 24 (21) : 16081 - 16096
  • [8] XACML policy integration algorithms
    Mazzoleni, Pietro
    Crispo, Bruno
    Sivasubramanian, Swaminathan
    Bertino, Elisa
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (01)
  • [9] XACBench: a XACML policy benchmark
    Shayan Ahmadi
    Mohammad Nassiri
    Mohsen Rezvani
    Soft Computing, 2020, 24 : 16081 - 16096
  • [10] Using XACML for Embedded and Fine-Grained Access Control Policy
    Hsieh, George
    Foster, Keith
    Emamali, Gerald
    Patrick, Gregory
    Marvel, Lisa
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 462 - +