Authorization Constraint Enforcement for Information System Security

被引:0
|
作者
Hewett, Rattikorn [1 ]
Kijsanayothin, Phongphun [1 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Abilene, TX 79601 USA
关键词
role-based access control; separation of duty; information security; conflict of interest; policy compliance;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Managing access authorities is critical to the security of information systems. To prevent fraud or abuse due to conflict of interests, a well-known authorization constraint called Separation of Duty (SoD) is commonly applied. SoD ensures that no single user receives too many authorities Enforcement of authorization constraints such as SoD in large organizations can be difficult due to the large number of information system, Users the variety of assets involved, and tasks that require roles that may be shared or delegated at multiple levels. Most existing work in this area focuses on specifications of SoD constraints and assumes that constraints can be enforced by logical inference mechanisms at run-time. A drawback of this approach is that when violations occur, finding alternative role activations at run-time may not be feasible This can result in delays or even failure for critical service transactions. Moreover, logic-based systems are difficult to understand and do not scale easily. This paper presents an algorithmic set-based approach that automatically checks for SoD compliance prior to run-time by searching for a set of valid role activations. The paper discusses details of this approach and illustrates its use in managing access authorizations in a health insurance claim processing system.
引用
收藏
页码:3501 / 3506
页数:6
相关论文
共 50 条
  • [1] Enforcement of opacity security properties for ship information system
    Xing, Bowen
    Dai, Jin
    Liu, Sheng
    INTERNATIONAL JOURNAL OF NAVAL ARCHITECTURE AND OCEAN ENGINEERING, 2016, 8 (05) : 423 - 433
  • [2] Context based enforcement of authorization for privacy and security in identity management
    Alagar, Vasu
    Wan, Kaiyu
    POLICIES AND RESEARCH IN IDENTITY MANAGEMENT, 2008, 261 : 25 - 37
  • [3] Context based enforcement of authorization for privacy and security in identity management
    Alagar, Vasu
    Wan, Kaiyu
    IFIP Advances in Information and Communication Technology, 2008, 261 : 25 - 37
  • [4] Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives
    Basin, David
    Burri, Samuel J.
    Karjoth, Guenter
    2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 99 - 113
  • [5] Obstruction-free authorization enforcement: Aligning security and business objectives
    Basin, David
    Burri, Samuel J.
    Karjoth, Gunter
    JOURNAL OF COMPUTER SECURITY, 2014, 22 (05) : 661 - 698
  • [6] A New Technology for An Information Network of Security and Authorization
    Hirata, Kazuko
    Aoki, Hiroyuki
    ISCE: 2009 IEEE 13TH INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2009, : 985 - +
  • [7] Authorization Enforcement Detection
    Porat, Ehood
    Tikochinski, Shmuel
    Stulman, Ariel
    PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
  • [8] The PRIMA system for privilege management, authorization and enforcement in grid environments
    Lorch, M
    Adams, DB
    Kafura, D
    Koneni, MSR
    Rathi, A
    Shah, S
    FOURTH INTERNATIONAL WORKSHOP ON GRID COMPUTING, PROCEEDINGS, 2003, : 109 - 116
  • [9] Authorization Constraints Specification and Enforcement
    Zhou, Wei
    Meinel, Christoph
    Xiang, Yidong
    Shao, Yang
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 38 - 50
  • [10] Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing
    Krishnan, Ram
    Sandhu, Ravi
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 102 - 115