Authorization Constraints Specification and Enforcement

被引:0
|
作者
Zhou, Wei [1 ]
Meinel, Christoph [1 ]
Xiang, Yidong [2 ]
Shao, Yang [2 ]
机构
[1] Potsdam Univ, Hasso Plattner Inst, Prof Dr Helmert Str 2-3, D-14482 Potsdam, Germany
[2] Beijing Shenzhou Aerosp Software Technol Co Ltd, Beijing 100036, Peoples R China
来源
关键词
Access control; authorization constraints; constraints specification; constraints enforcement;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constraints are an important aspect of role-based access control (RBAC) and its different extensions. They are often regarded as one of the principal motivations behind these access control models. There are two important issues relating to constraints: their specification and their enforcement. However, the existing approaches cannot comprehensively support both of them. On the other hand, the early research effort mainly concentrates on separation of duty. In this paper, we introduce two novel authorization constraint specification schemes named prohibition constraint scheme and obligation constraint scheme respectively. Both of them can be used for both expressing and enforcing authorization constraints. These schemes are strongly bound to authorization entity set functions and relation functions that could be mapped to the functions that need to be developed in application systems, so they can provide the system developers a clear view about which functions should be developed in an authorization constraint system. Based on these functions, various constraint schemes can be easily defined. The security administrators can use these functions to create constraint schemes for their day-to-day operations. A constraint system could be scalable through defining new entity set functions and entity relation functions. This approach goes beyond the well known separation of duty constraints, and considers many aspects of entity relation constraints.
引用
收藏
页码:38 / 50
页数:13
相关论文
共 50 条
  • [1] Authorization constraints specification of RBAC
    Han, Lilong
    Liu, Qingtan
    Yang, Zongkai
    [J]. INFORMATION SECURITY APPLICATIONS, 2007, 4867 : 266 - 276
  • [2] Specification and Enforcement of Dynamic Authorization Policies oriented by Situations
    Kabbani, Bashar
    Laborde, Romain
    Barrere, Francois
    Benzekri, Abdelmalek
    [J]. 2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [3] Specification and enforcement of classification and inference constraints
    Dawson, S
    di Vimercati, SD
    Samarati, P
    [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 181 - 195
  • [4] Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing
    Krishnan, Ram
    Sandhu, Ravi
    [J]. INFORMATION SYSTEMS SECURITY, 2011, 7093 : 102 - 115
  • [5] XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement
    Mohamed, Aya
    Auer, Dagmar
    Hofer, Daniel
    Kueng, Josef
    [J]. PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 442 - 449
  • [6] Authorization Enforcement Detection
    Porat, Ehood
    Tikochinski, Shmuel
    Stulman, Ariel
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 179 - 182
  • [7] Role-based authorization constraints specification using object constraint language
    Ahn, GJ
    Shin, ME
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 157 - 162
  • [8] Authorization enforcement in distributed query evaluation
    di Vimercati, Sabrina
    Foresti, Sara
    Jajodia, Sushil
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. JOURNAL OF COMPUTER SECURITY, 2011, 19 (04) : 751 - 794
  • [9] Authorization Enforcement Usability Case Study
    Bartsch, Steffen
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2011, 6542 : 209 - 220
  • [10] Authorization Specification of Usage Control with CPN
    Li Pei-Wu
    [J]. 2008 INTERNATIONAL WORKSHOP ON INFORMATION TECHNOLOGY AND SECURITY, 2008, : 88 - 92