Authorization Constraints Specification and Enforcement

被引:0
|
作者
Zhou, Wei [1 ]
Meinel, Christoph [1 ]
Xiang, Yidong [2 ]
Shao, Yang [2 ]
机构
[1] Potsdam Univ, Hasso Plattner Inst, Prof Dr Helmert Str 2-3, D-14482 Potsdam, Germany
[2] Beijing Shenzhou Aerosp Software Technol Co Ltd, Beijing 100036, Peoples R China
来源
关键词
Access control; authorization constraints; constraints specification; constraints enforcement;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Constraints are an important aspect of role-based access control (RBAC) and its different extensions. They are often regarded as one of the principal motivations behind these access control models. There are two important issues relating to constraints: their specification and their enforcement. However, the existing approaches cannot comprehensively support both of them. On the other hand, the early research effort mainly concentrates on separation of duty. In this paper, we introduce two novel authorization constraint specification schemes named prohibition constraint scheme and obligation constraint scheme respectively. Both of them can be used for both expressing and enforcing authorization constraints. These schemes are strongly bound to authorization entity set functions and relation functions that could be mapped to the functions that need to be developed in application systems, so they can provide the system developers a clear view about which functions should be developed in an authorization constraint system. Based on these functions, various constraint schemes can be easily defined. The security administrators can use these functions to create constraint schemes for their day-to-day operations. A constraint system could be scalable through defining new entity set functions and entity relation functions. This approach goes beyond the well known separation of duty constraints, and considers many aspects of entity relation constraints.
引用
收藏
页码:38 / 50
页数:13
相关论文
共 50 条
  • [41] Specification of constraints in business flow
    Yura, S
    Motoda, T
    Yamamoto, S
    [J]. FOURTH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE - PROCEEDINGS, 2000, : 102 - 106
  • [42] Modular Specification of Architectural Constraints
    Bessa, Sandalo
    Valente, Marco Tulio
    Terra, Ricardo
    [J]. PROCEEDINGS OF 2016 X BRAZILIAN SYMPOSIUM ON SOFTWARE COMPONENTS, ARCHITECTURES AND REUSE (SBCARS), 2016, : 31 - 40
  • [43] Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives
    Basin, David
    Burri, Samuel J.
    Karjoth, Guenter
    [J]. 2011 IEEE 24TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2011, : 99 - 113
  • [45] IVD: Automatic Learning and Enforcement of Authorization Rules in Online Social Networks
    Marinescu, Paul
    Parry, Chad
    Pomarole, Marjori
    Tian, Yuan
    Tague, Patrick
    Papagiannis, Ioannis
    [J]. 2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 1094 - 1109
  • [46] Cost enforcement in the real-time specification for Java
    Osmar Marchi dos Santos
    Andy Wellings
    [J]. Real-Time Systems, 2007, 37 : 139 - 179
  • [47] Obstruction-free authorization enforcement: Aligning security and business objectives
    Basin, David
    Burri, Samuel J.
    Karjoth, Gunter
    [J]. JOURNAL OF COMPUTER SECURITY, 2014, 22 (05) : 661 - 698
  • [48] Policy specification and enforcement for smart ID cards deployment
    Chandramouli, Ramaswamy
    [J]. 2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 127 - 134
  • [49] Towards Software Compliance Specification and Enforcement Using TOSCA
    Mubarkoot, Mohammed
    Altmann, Jorn
    [J]. ECONOMICS OF GRIDS, CLOUDS, SYSTEMS, AND SERVICES, GECON 2021, 2021, 13072 : 168 - 177
  • [50] Specification & Enforcement of Access Control in Information & Communication Systems
    El Kalam, Anas Abou
    [J]. 2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585