Composing administrative scope of delegation policies based on extended XACML

被引:0
|
作者
Feng, Li Xiao [1 ]
Guo, Feng Deng [1 ]
机构
[1] Chinese Acad Sci, Inst Software, State Key Lab Informat Secur, Beijing 100080, Peoples R China
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
XACML as a language of access policy and access context request based on attributes is widely accepted. Current XACML specification's main shortcoming is not considering delegation. A TC in OASIS proposed a draft about administrative policy, which extended XACML to describe delegation policies and stated how to process delegation policies in access decisions. In some cases, a supervisor may need to know administration authorities possessed by a manager who gets them through delegation policies. For providing such information, access control management systems should calculate total administration authority of a manager according to related delegation policies. Current XACML related works haven't addressed this topic. In this paper we define basic administrative scope and its simple XML schema, use a set of administrative scope representing administrative authority. Using these definitions, we formally describe the calculation of a manager's total administrative scope.
引用
收藏
页码:467 / 470
页数:4
相关论文
共 50 条
  • [1] Challenges of Composing XACML Policies
    Stepien, Bernard
    Felty, Amy
    Matwin, Stan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 234 - 241
  • [2] Managing the lifecycle of XACML delegation policies in federated environments
    Sanchez, Manuel
    Canovas, Oscar
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio F.
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 717 - +
  • [3] Using XML and XACML to support attribute based delegation
    Ye, CX
    Wu, ZF
    FIFTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - PROCEEDINGS, 2005, : 751 - 756
  • [4] Ontology-Based Delegation of Access Control: An Enhancement to the XACML Delegation Profile
    Daud, Malik Imran
    Sanchez, David
    Viejo, Alexandre
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, 2015, 9264 : 18 - 29
  • [5] Composing Diverse Policies for Temporally Extended Tasks
    Angelov, Daniel
    Hristov, Yordan
    Burke, Michael
    Ramamoorthy, Subramanian
    IEEE ROBOTICS AND AUTOMATION LETTERS, 2020, 5 (02): : 2658 - 2665
  • [6] Implementing ACL-based Policies in XACML
    Karjoth, Guenter
    Schade, Andreas
    Van Herreweghen, Els
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 183 - 192
  • [7] Automated Coverage-Based Testing of XACML Policies
    Xu, Dianxiang
    Shrestha, Roshan
    Shen, Ning
    SACMAT'18: PROCEEDINGS OF THE 23RD ACM SYMPOSIUM ON ACCESS CONTROL MODELS & TECHNOLOGIES, 2018, : 3 - 14
  • [8] XACML-Based composition policies for ambient networks
    Kamienski, Carlos
    Fidalgo, Joseane
    Dantas, Ramide
    Sadok, Djamel
    Ohlman, Boerje
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
  • [9] An Extended Delegation Model Based On RBAC
    Li, Jinshuang
    Chang, Guiran
    2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 228 - 231
  • [10] Coverage-based Test Cases Selection for XACML Policies
    Bertolino, Antonia
    Le Traon, Yves
    Lonetti, Francesca
    Marchetti, Eda
    Mouelhi, Tejeddine
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 12 - 21