X-FEDERATE: A policy engineering framework for federated access management

被引:20
作者
Bhatti, Rafae [1 ]
Bertino, Elisa
Ghafoor, Arif
机构
[1] Purdue Univ, Dept Elect & Comp Engn, W Lafayette, IN 47906 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47906 USA
基金
美国国家科学基金会;
关键词
federated systems; software engineering; security management; role-based access control;
D O I
10.1109/TSE.2006.49
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Policy-Based Management (PBM) has been considered as a promising approach for design and enforcement of access management policies for distributed systems. The increasing shift toward federated information sharing in the organizational landscape, however, calls for revisiting current PBM approaches to satisfy the unique security requirements of the federated paradigm. This presents a twofold challenge for the design of a PBM approach, where, on the one hand, the policy must incorporate the access management needs of the individual systems, while, on the other hand, the policies across multiple systems must be designed in such a manner that they can be uniformly developed, deployed, and integrated within the federated system. In this paper, we analyze the impact of security management challenges on policy design and formulate a policy engineering methodology based on principles of software engineering to develop a PBM solution for federated systems. We present X-FEDERATE, a policy engineering framework for federated access management using an extension of the well-known Role-Based Access Control (RBAC) model. Our framework consists of an XML-based policy specification language, its UML-based meta-model, and an enforcement architecture. We provide a comparison of our framework with related approaches and highlight its significance for federated access management. The paper also presents a federation protocol and discusses a prototype of our framework that implements the protocol in a federated digital library environment.
引用
收藏
页码:330 / 346
页数:17
相关论文
共 33 条
[1]  
[Anonymous], 2005, OASIS XACML
[2]  
[Anonymous], P 2002 IEEE S SEC PR
[3]  
[Anonymous], 1998, 2401 RFC IETF
[4]  
BHATTI R, 2004, P 9 ACM S ACC CONTR
[5]  
BHATTI R, 2005, ACM T INFORMATION SY, V8
[6]  
Blaze M., 1998, P 6 INT WORKSH SEC P, P59
[7]  
Carlson D., 2001, Modeling XML applications with UML, practical e-Business applications
[8]  
CHADWICK D, 2002, P 7 ACM S ACC CONTR
[9]  
Clark D. D., 1987, Proceedings of the 1987 IEEE Symposium on Security and Privacy (Cat. No.87CH2416-6), P184
[10]  
Damianou N., 2001, P WORKSH POL DISTR S