Authorization Constraint Enforcement for Information System Security

被引:0
|
作者
Hewett, Rattikorn [1 ]
Kijsanayothin, Phongphun [1 ]
机构
[1] Texas Tech Univ, Dept Comp Sci, Abilene, TX 79601 USA
关键词
role-based access control; separation of duty; information security; conflict of interest; policy compliance;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Managing access authorities is critical to the security of information systems. To prevent fraud or abuse due to conflict of interests, a well-known authorization constraint called Separation of Duty (SoD) is commonly applied. SoD ensures that no single user receives too many authorities Enforcement of authorization constraints such as SoD in large organizations can be difficult due to the large number of information system, Users the variety of assets involved, and tasks that require roles that may be shared or delegated at multiple levels. Most existing work in this area focuses on specifications of SoD constraints and assumes that constraints can be enforced by logical inference mechanisms at run-time. A drawback of this approach is that when violations occur, finding alternative role activations at run-time may not be feasible This can result in delays or even failure for critical service transactions. Moreover, logic-based systems are difficult to understand and do not scale easily. This paper presents an algorithmic set-based approach that automatically checks for SoD compliance prior to run-time by searching for a set of valid role activations. The paper discusses details of this approach and illustrates its use in managing access authorizations in a health insurance claim processing system.
引用
收藏
页码:3501 / 3506
页数:6
相关论文
共 50 条
  • [21] Authorization Enforcement Usability Case Study
    Bartsch, Steffen
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 209 - 220
  • [22] Security enforcement in the DOK federated database system
    Tari, Z
    Fernandez, G
    DATABASE SECURITY VOLUME X - STATUS AND PROSPECTS, 1997, : 23 - 42
  • [23] Information security investment with budget constraint and security information snaring in resource-snaring environments
    Gao, Xing
    Qiu, Manting
    Wang, Ying
    Wang, Xifan
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2023, 74 (06) : 1520 - 1535
  • [24] Authorization in CORBA security
    Karjoth, G
    COMPUTER SECURITY - ESORICS 98, 1998, 1485 : 143 - 158
  • [25] The deterrent and displacement effects of information security enforcement: International evidence
    Png, Ivan P. L.
    Wang, Chen-Yu
    Wang, Qiu-Hong
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 125 - 144
  • [26] Information Security Policy Quality and Enforcement: Is Compliance a Solution to Fraud
    Brown, Dennis
    Zafar, Humayun
    AMCIS 2017 PROCEEDINGS, 2017,
  • [27] Commentary: Should CBP Use Security Information for Commercial Enforcement?
    Suarez, Evelyn
    Thompson, Forbes
    GLOBAL TRADE AND CUSTOMS JOURNAL, 2011, 6 (01): : 37 - 38
  • [28] Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
    Kovacs, Mate
    Seidl, Helmut
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 46 - 59
  • [29] EFFICIENT APPROACH FOR CONSTRAINT ENFORCEMENT IN CONSTRAINED MULTIBODY SYSTEM DYNAMICS
    Mukherjee, Rudranarayan
    Malczyk, Pawel
    PROCEEDINGS OF THE ASME INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2013, VOL 7A, 2014,
  • [30] SYSTEM INFORMATION SECURITY
    Rodriguez Garcia, Manuel
    Ramos Alvarez, Benjamin
    SISTEMAS E TECHNOLOGIAS DE INFORMACAO: ACTAS DA 4A CONFERENCIA IBERICA DE SISTEMAS E TECNOLOGIAS DE LA INFORMACAO, 2009, : 67 - 71