Design and Implementation of a CIM-SPL Based RBAC Policy Language

Article Preview

Abstract:

Since the original CIM-SPL policy language does not support access control policy, the CIM-SPL is extended with the RBAC model in this paper. Then a new CIM-SPL based RBAC policy language is designed and implemented. The syntax specification of the new policy language complies with the original CIM-SPL. So it is quite suitable to describe access control policies for information systems specified by CIM. The implementation framework of the new access control policy language is based on the IETF PDP/PEP approach and is integrated in the Open Pegasus system which is the most widely used open-source software of CIM implementation. At last, a case study of Health Information System is used to demonstrate the flexibility and applicability of the new access control policy language.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

126-131

Citation:

Online since:

August 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] D.F. Ferraiolo, R.S. Sandhu, G. Serban, A Proposed Standard for Role-Based Access Control, ACM Transanctions on Information System Security, Vol. 4, No. 3, August 2001, pp.224-274.

DOI: 10.1145/501978.501980

Google Scholar

[2] DMTF, Common Information Model (CIM) Infrastructure, v2. 6. 0 (2010).

Google Scholar

[3] Anderson, ed., XACML Profile for Role-Based Access Control (RBAC), OASIS Access Control TC committee 01, 13 Feb (2004).

Google Scholar

[4] Damianou, N., Dulay, N., Lupu, E., Sloman, M., The Ponder Policy Specification Language , Proceedings of the Internatioanl Workshop on Policies for Distributed Systems and Network, 2001, pp.18-38.

DOI: 10.1007/3-540-44569-2_2

Google Scholar

[5] Dakshi Agrawal, Seraphin Calo, Kang-Won Lee, Jorge Lobo, Issues in Designing a Policy Language for Distributed Management of IT Infrastructures, 10th IFIP/IEEE International Symposium on Integrated Network Management,2007,pp.30-39.

DOI: 10.1109/inm.2007.374767

Google Scholar

[6] Li Pan, Jorge Lobo, Seraphin Calo, Extending the CIM-SPL Policy Language with RBAC for Distributed Management Systems in the WBEM Infrastructure, IFIP/IEEE International Symposium on Integrated Network Management 2009, pp.145-148.

DOI: 10.1109/inm.2009.5188803

Google Scholar

[7] R. Yavatkar, D. Pendarakis, R. Guerin, A Framework for Policy-based Admission Control, IETF RFC 2753, Jan (2000).

DOI: 10.17487/rfc2753

Google Scholar

[8] The Open Group OpenPegasus C++ CIM/WBEM manageability service broker. http: /www. openpegasus. org.

Google Scholar

[9] http: /www. antlr. org.

Google Scholar

[10] M. Evered and S. Bogeholz. A case study in access control requirements for a health information system. In workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation, page 53-61, (2004).

Google Scholar