Access Control Metamodel for Policy Specification and Enforcement: From Conception to Formalization

被引:3
|
作者
Kashmar, Nadine [1 ,3 ]
Adda, Mehdi [1 ]
Atieh, Mirna [2 ]
Ibrahim, Hussein [3 ]
机构
[1] Univ Quebec Rimouski, Dept Math Informat & Genie, 300 Allee Ursulines, Rimouski, PQ G5L 3A1, Canada
[2] Lebanese Univ, Fac Econ Sci & Adm, Business Comp Dept, Hadat, Lebanon
[3] Inst Technol Maintenance Ind, 175 Rue Verendrye, Sept Iles, PQ G4R 5B7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
access control; metamodel; security and privacy; IoT; policy;
D O I
10.1016/j.procs.2021.03.111
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the widespread of data, applications, and devices in today's dynamic computing environments, controlling access to assets from multiple sources is a key challenge, especially with the presence of cybercriminals and cyberattacks. Several access control (AC) models are developed and implemented in different computing environments to control users' access to resources. But, the emergence of ubiquitous computing, especially the concept of industry 4.0 and IoT applications, releases new prospects to traditional information systems by merging new technologies and services for seamless access to information sources at anytime and anywhere. With this fact, it is realized that these AC models no longer meet the increasing demand for privacy and security standards. Hence, several AC metamodels with higher level of abstraction are developed as unifying frameworks for specifying any AC policy. Unfortunately, the proposed AC metamodels have several limitations. One of these limitations is that they are not generic enough to include all features and the heterogeneous AC models. In this paper we propose a solution for this limitation by developing a generic AC metamodel where its features can be upgraded to answer the needs and facts of the new technologies. (C) 2021 The Authors. Published by Elsevier B.V.
引用
下载
收藏
页码:887 / 892
页数:6
相关论文
共 50 条
  • [41] Automated Management of Network Access Control from Design to Enforcement
    Al-Shaer, Ehab
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 77 - 77
  • [42] A platform independent access control metamodel for web services
    Simon, Balázs
    Goldschmidt, Balázs
    Kondorosi, Károly
    Periodica polytechnica Electrical engineering and computer science, 2014, 58 (03): : 93 - 108
  • [43] A metamodel of access control for distributed environments: Applications and properties
    Bertolissi, Clara
    Fernandez, Maribel
    INFORMATION AND COMPUTATION, 2014, 238 : 187 - 207
  • [44] A metamodel for design review derived from design specification templates
    Motoyama, Atsushi
    Nakatani, Takako
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2012, 240 : 108 - 117
  • [45] Semantics-based access control - Ontologies and feasibility study of policy enforcement function
    Naumenko, Anton
    WEBIST 2007: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL IT: INTERNET TECHNOLOGY, 2007, : 150 - 155
  • [46] Specification and adaptive verification of access control policy for cyber-physical-social spaces
    Cao, Yan
    Ping, Yuan
    Tao, Shaohua
    Chen, YongGang
    Zhu, YanXia
    COMPUTERS & SECURITY, 2022, 114
  • [47] Analysis of access control enforcement in android
    Enck, William
    Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT, 2020, : 117 - 118
  • [48] Analysis of Access Control Enforcement in Android
    Enck, William
    SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 117 - 118
  • [49] Verification and enforcement of access control policies
    Antonio Cau
    Helge Janicke
    Ben Moszkowski
    Formal Methods in System Design, 2013, 43 : 450 - 492
  • [50] Verification and enforcement of access control policies
    Cau, Antonio
    Janicke, Helge
    Moszkowski, Ben
    FORMAL METHODS IN SYSTEM DESIGN, 2013, 43 (03) : 450 - 492