An Attribute Mapping Technique for Secure Interoperation in Multi-Domain Environments

Article Preview

Abstract:

Role mapping is a basic technique for facilitating interoperation in RBAC-based collaborating environments. However, role mapping lacks the flexibility to specify access control policies in the scenarios where the access control is not a simple action, but consists of a sequence of actions and events from subjects and system. In this paper, we propose an attribute mapping technique to establish secure context in multi-domain environments. We first classify attributes into eight types and show that only two types of attributes need to be translated. We second give the definition of attribute mapping technique, and analysis the properties of attribute mapping. Finally, we study how cardinality constraint violation arises and shows that it is efficient to resolve this security violation.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

181-184

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] H. Huang, H. Kirchne, Secure interoperation design in multi-domains environments based on colored Petri nets. International Journal of Information Sciences, Volume 221, February, 2013, pp.591-606.

DOI: 10.1016/j.ins.2012.09.027

Google Scholar

[2] D. Basin, S. J. Burri, G. Karjoth, Dynamic enforcement of abstract separation of duty constraints. ACM Transactions on Information and System Security, Vol. 15, Issue 3, 2012, pp.30-50.

DOI: 10.1145/2382448.2382451

Google Scholar

[3] J. Hu, R. Li, Z. Lu, J. Lu, X. Ma, RAR: A role-and-risk based flexible framework for secure collaboration. Future Generation Computer System, vol. 27, no. 5, 2011, pp.574-586.

DOI: 10.1016/j.future.2010.09.008

Google Scholar

[4] A. Kapadia , J. Al-Muhtadi , R. Campbell , et al, IRBAC2000 : Secure interoperability using dynamic role translation. University of Illinois, Technical Report: UIUCDCS-R-2000-2162, (2000).

Google Scholar

[5] J. Hu, R. Li,Z. Lu, On Role Mappings for RBAC-based Secure Interoperation. Proc. 3rd International Conference on Network and System Security, Gold Coast, Queensland, Australia, October, 2009, pp.270-277.

DOI: 10.1109/nss.2009.76

Google Scholar

[6] M. Shehab, E. Bertino, and A. Ghafoor, SERAT: Secure Role mapping Technique for Decentralized Secure Interoperability, Proc. 10th ACM Symposium on Access Control, Models and Technologies, Stockholm, Sweden, 2005, p.159–167.

DOI: 10.1145/1063979.1064007

Google Scholar

[7] B. Shafiq., J. B. D. Joshi., and E. Bertinom, Secure Interoperation in a Multi-domain Environment Employing RBAC Policies, IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 11, 2005, pp.1557-1577.

DOI: 10.1109/tkde.2005.185

Google Scholar

[8] X. Zhang, F. Parisi-Presicce, R. Sandhu, and J. Park, Formal model and policy specification of usage control, ACM Transactions on Information and Systems Security, Vol. 8, No. 4, 2005, pp.351-387.

DOI: 10.1145/1108906.1108908

Google Scholar

[9] H. Junbeom, N. D. Kun, Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, Iss. 7, 2011, pp.1214-1221.

DOI: 10.1109/tpds.2010.203

Google Scholar

[10] J. Park, X. Zhang, R.S. Sandhu, Attribute Mutability in Usage Control, Proc. 18th IFIP WG 11. 3 Working Conference on Data and Applications Security, Sitges, Spain, 2004, pp.15-29.

DOI: 10.1007/1-4020-8128-6_2

Google Scholar