Enforcing role based access control model with multimedia signatures

被引:6
|
作者
Al Bouna, Bechara [1 ]
Chbeir, Richard [1 ]
Marrara, Stefania [2 ]
机构
[1] Univ Burgundy, CNRS, LE21, F-21078 Dijon, France
[2] Univ Milan, Dept Informat Technol, I-26013 Crema, CR, Italy
关键词
Access control model; Multimedia signatures;
D O I
10.1016/j.sysarc.2008.10.003
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Recently ubiquitous technology has invaded almost every aspect of the modern life. Several application domains, have integrated ubiquitous technology to make the management of resources a dynamic task. However, the need for adequate and enforced authentication and access control models to provide safe access to sensitive information remains a critical matter to address in such environments. Many security models were proposed in the literature thus few were able to provide adaptive access decisions based on the environmental changes. In this paper, we propose an approach based on our previous work [B.A. Bouna, R. Chbeir, S. Marrara, A multimedia access control language for virtual and ambient intelligence environments, In Secure Web Services (2007) 111-120] to enforce current role based access control models [M.J. Moyer, M. Ahama, Generalized role-based access control, in: Proceedings of International Conference on Distributed Computing Systems (ICDCS), Phoenix, Arizona, USA, 2001. pp. 391-398] using multimedia objects in a dynamic environment. In essence, multimedia objects tend to be complex, memory and time consuming nevertheless they provide interesting information about users and their context (user surrounding, his moves and gesture, people nearby, etc.). The idea behind our approach is to attribute to roles and permissions, multimedia signatures in which we integrate conditions based on users' context information described using multimedia objects in order to limit role activation and the abuse of permissions in a given environment. We also describe our architecture which extends the known XACML [XACML, XACML Profile for Role Based Access Control (RBAC), http://docs.oasis-open.org/xacml/cd-xacml-rbac-profile-01.pdf.2008] terminology to incorporate multimedia signatures. We provide an overview of a possible implementation of the model to illustrate how it could be valuable once integrated in an intelligent environment. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:264 / 274
页数:11
相关论文
共 50 条
  • [1] An approach to enforcing Clark-Wilson model in role-based access control model
    Liang, B
    Shi, WC
    Sun, YF
    Sun, B
    CHINESE JOURNAL OF ELECTRONICS, 2004, 13 (04): : 596 - 599
  • [2] Scalable and Efficient Reasoning for Enforcing Role-Based Access Control
    Cadenhead, Tyrone
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 209 - 224
  • [3] A criterion-based role-based multilayer access control model for multimedia applications
    Pan, Leon
    Zhang, Chang N.
    ISM 2006: EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA, PROCEEDINGS, 2006, : 145 - +
  • [4] Enforcing Role-Based Access Control for Secure Data Storage in the Cloud
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    COMPUTER JOURNAL, 2011, 54 (10): : 1675 - 1687
  • [5] Specifying and enforcing the principle of least privilege in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Lu, Jianfeng
    Dong, Meng
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1313 - 1331
  • [6] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [7] Enforcing Role-Based Access Control Policies in Web Services with UML and OCL
    Sohr, Karsten
    Mustafa, Tanveer
    Bao, Xinyu
    Ahn, Gail-Joon
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 257 - +
  • [8] Logic-based approach for enforcing access control
    Bertino, Elisa
    Buccafurri, Francesco
    Ferrari, Elena
    Rullo, Pasquale
    Journal of Computer Security, 2000, 8 (02) : 109 - 139
  • [9] Resource and Role Based Access Control Model
    Li, Xingdong
    Jin, Zhengping
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 548 - 554
  • [10] Attributed Role Based Access Control Model
    Aftab, Muhammad Umar
    Habib, Muhammad Asif
    Mehmood, Nasir
    Aslam, Mubeen
    Irfan, Muhammad
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 83 - 89