Authorization Constraints Specification and Enforcement

被引:0
|
作者
Zhou, Wei [1 ]
Meinel, Christoph [1 ]
Xiang, Yidong [2 ]
Shao, Yang [2 ]
机构
[1] Potsdam Univ, Hasso Plattner Inst, Prof Dr Helmert Str 2-3, D-14482 Potsdam, Germany
[2] Beijing Shenzhou Aerosp Software Technol Co Ltd, Beijing 100036, Peoples R China
来源
关键词
Access control; authorization constraints; constraints specification; constraints enforcement;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constraints are an important aspect of role-based access control (RBAC) and its different extensions. They are often regarded as one of the principal motivations behind these access control models. There are two important issues relating to constraints: their specification and their enforcement. However, the existing approaches cannot comprehensively support both of them. On the other hand, the early research effort mainly concentrates on separation of duty. In this paper, we introduce two novel authorization constraint specification schemes named prohibition constraint scheme and obligation constraint scheme respectively. Both of them can be used for both expressing and enforcing authorization constraints. These schemes are strongly bound to authorization entity set functions and relation functions that could be mapped to the functions that need to be developed in application systems, so they can provide the system developers a clear view about which functions should be developed in an authorization constraint system. Based on these functions, various constraint schemes can be easily defined. The security administrators can use these functions to create constraint schemes for their day-to-day operations. A constraint system could be scalable through defining new entity set functions and entity relation functions. This approach goes beyond the well known separation of duty constraints, and considers many aspects of entity relation constraints.
引用
收藏
页码:38 / 50
页数:13
相关论文
共 50 条
  • [21] Specification and design of advanced authentication and authorization services
    Lopez, J
    Montenegro, JA
    Vivas, JL
    Okamoto, E
    Dawson, E
    [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 467 - 478
  • [22] A policy validation framework for enterprise authorization specification
    Chandramouli, R
    [J]. 19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 319 - 328
  • [23] Deterministic enforcement of constraints
    Laurent, D
    Spyratos, N
    Stamate, D
    [J]. PROGRAMMING AND COMPUTER SOFTWARE, 1998, 24 (02) : 71 - 83
  • [24] Deterministic Enforcement of Constraints
    Laurent, D.
    Spyratos, N.
    Stamate, D.
    [J]. Programming and Computer Software (English Translation of Programmirovanie), 24 (02):
  • [25] Specification and runtime enforcement of security policies
    Jin, Ying
    Zhang, Jing
    Zheng, Xiaojuan
    [J]. 2007 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING WORKSHOPS, PROCEEDINGS, 2007, : 244 - +
  • [26] The specification and enforcement of advanced security policies
    Ryutov, T
    Neuman, C
    [J]. THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 128 - 138
  • [27] Compiling NATO Authorization Policies for Enforcement in the Cloud and SDNs
    Armando, Alessandro
    Ranise, Silvio
    Traverso, Riccardo
    Wrona, Konrad
    [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 741 - 742
  • [28] Secure Access for MANET Using Authorization Enforcement Facility
    Gowthami
    Sangeetha
    [J]. 2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 212 - 216
  • [29] Using RDF for policy specification and enforcement
    Carminati, B
    Ferrari, E
    Thuraisingham, B
    [J]. 15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 163 - 167
  • [30] Analyzing the Performance Impact of Authorization Constraints and Optimizing the Authorization Methods for Workflows
    Chaudhary, Nadeem
    He, Ligang
    [J]. 2013 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING (HIPC), 2013, : 1 - 9