Realization of FGAC Model using XACML Policy Specification

被引:0
|
作者
Shibli, Muhammad Awais [1 ]
Masood, Rahat [1 ]
Habiba, Umme [1 ]
机构
[1] NUST, SEECS, H-12 Campus, Islamabad 44000, Pakistan
关键词
Fine-Grained Access Control; Authorization; eX-tensible Access Control Markup Language; Policy Specification Language; Policy Administration Point; Policy Decision Point; ACCESS-CONTROL;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
FGAC model has been adopted by enterprise applications, for the protection of their databases. Most of these deployments are not only limited in purpose but are dependent upon various other factors including query modification algorithms and software development languages. These factors have not only limited their applicability for distributed computing environments but have also affected their widespread adoption and acceptance. Moreover, due to the absence of standard FGAC profile specification, existing FGAC authorization techniques become unsuitable for advance applications such as web 2.0 and cannot be deployed across various platforms, thus fall short of flexibility and customizability. As a result, there is an increasing demand for standard based FGAC specification that could be easily fit into majority of computing environments. In this paper, we bring forth a policy specification (profile) for FGAC model. Our proposed specification is not restricted to database applications only; rather it is generic and flexible enough to be applied on every type of application. It explicates the ways in which organizations would be able to implement standard based fine-grained access control for nearly every application. We present the case-study - a realization of FGAC model based on the proposed policy specification followed by a complete dry-run of policy evaluation procedure.
引用
收藏
页码:187 / 192
页数:6
相关论文
共 50 条
  • [41] Policy Evaluation and Dynamic Management Based on Matching Tree for XACML
    Kang, Hongzhaoning
    Gang, Liu
    Wang, Quan
    Zhang, Runnan
    Zhong, Zichao
    Tian, Yumin
    2020 IEEE 19TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2020), 2020, : 1530 - 1535
  • [42] \ Statistics & Clustering Based Framework for Efficient XACML Policy Evaluation
    Marouf, Said
    Shehab, Mohamed
    Squicciarini, Anna
    Sundareswaran, Smitha
    2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 118 - +
  • [43] POLICY ROBUSTNESS - SPECIFICATION AND SIMULATION OF A MONTHLY MONEY MARKET MODEL
    TINSLEY, PA
    FARR, HT
    FRIES, G
    GARRETT, B
    MUEHLEN, PV
    JOURNAL OF MONEY CREDIT AND BANKING, 1982, 14 (04) : 829 - 856
  • [44] Estimating fiscal policy reaction functions: The role of model specification
    Ploedt, Martin
    Reicher, Claire A.
    JOURNAL OF MACROECONOMICS, 2015, 46 : 113 - 128
  • [45] A Formal Validation Approach for XACML 3.0 Access Control Policy
    Caserio, Carmine
    Lonetti, Francesca
    Marchetti, Eda
    SENSORS, 2022, 22 (08)
  • [46] BP-XACML an Authorisation Policy Language for Business Processes
    Alissa, Khalid
    Reid, Jason
    Dawson, Ed
    Salim, Farzad
    INFORMATION SECURITY AND PRIVACY (ACISP 2015), 2015, 9144 : 307 - 325
  • [47] Design and development of the dynamic DRBAC model using PMI and xacml-based authorization
    Fugkeaw, Somchart
    Manpanpanich, Piyawit
    Juntapremjitt, Sekpon
    Journal of Digital Information Management, 2009, 7 (02): : 63 - 73
  • [48] Access control policy management based on extended-XACML
    State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China
    Tongxin Xuebao, 2007, 1 (103-110):
  • [49] Realization using the model existence theorem
    Fitting, Melvin
    JOURNAL OF LOGIC AND COMPUTATION, 2016, 26 (01) : 213 - 234
  • [50] FROM POLICY TO SPECIFICATION
    PUTTER, P
    ROOS, JD
    IFIP TRANSACTIONS C-COMMUNICATION SYSTEMS, 1992, 1 : 441 - 448