Secure interoperation in a multidomain environment employing RBAC policies

被引:123
作者
Shafiq, B
Joshi, JBD
Bertino, E
Ghafoor, A
机构
[1] Purdue Univ, Sch Elect & Comp Engn, W Lafayette, IN 47907 USA
[2] Univ Pittsburgh, Dept Informat Sci & Telecommun, Pittsburgh, PA 15260 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
基金
美国国家科学基金会;
关键词
secure interoperation; policy integration; role-based access control (RBAC); multidomain;
D O I
10.1109/TKDE.2005.185
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Multidomain application environments where distributed multiple organizations interoperate with each other are becoming a reality as witnessed by emerging Internet-based enterprise applications. Composition of a global coherent security policy that governs information and resource accesses in such environments is a challenging problem. In this paper, we propose a policy integration framework for merging heterogeneous Role-Based Access Control (RBAC) policies of multiple domains into a global access control policy. A key challenge in composition of this policy is the resolution of conflicts that may arise among the RBAC policies of individual domains. We propose an integer programming (IP)-based approach for optimal resolution of such conflicts. The optimality criterion is to maximize interdomain role accesses without exceeding the autonomy losses beyond the acceptable limit.
引用
收藏
页码:1557 / 1577
页数:21
相关论文
共 26 条
[11]  
GONG L, 1996, IEEE T SOFTWARE ENG, V22
[12]   Digital government security infrastructure design challenges [J].
Joshi, J ;
Ghafoor, A ;
Aref, WG ;
Spafford, EH .
COMPUTER, 2001, 34 (02) :66-+
[13]   A generalized temporal role-based access control model [J].
Joshi, JBD ;
Bertino, E ;
Latif, U ;
Ghafoor, A .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (01) :4-23
[14]  
Joshi JBD, 2002, P 7 ACM S ACC CONTR, P74
[15]  
Koch M., 2002, ACM Transactions on Information and Systems Security, V5, P332, DOI 10.1145/545186.545191
[16]  
LI WS, 1994, P VER LARG DAT BAS C
[17]   Conflicts in policy-based distributed systems management [J].
Lupu, EC ;
Sloman, M .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1999, 25 (06) :852-869
[18]  
Osborn S., 2000, ACM Transactions on Information and Systems Security, V3, P85, DOI 10.1145/354876.354878
[19]  
Pottinger R., 2003, P 29 INT C VER LARG, P826
[20]  
Power R., 2000, Tangled Web: Tales of digital crime from the shadows of cyberspace