XACML-Based Fine-Grained Security Policy for Distributed System

Article Preview

Abstract:

Distributed applications often require integrating security policies of collaborating parties. The integration must be able to support complex authorization specifications and the fine-grained resources access requirements that the various parties may have. But now security modeling is not considered as a vital part in software development. In this paper, it is proposed to integrate the design of access control policy into software development. In this paper, UML is used to model access control policy, and then a framework is designed to generate the security model result expressed in XACML and to verify the policy correct and complete.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 225-226)

Pages:

848-851

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Richard W.C. Lui, et al. Role Activation Management in Role Based Access Control[C].ACISP, pp.358-369(2008)

Google Scholar

[2] Tatyana Ryutov, et al. Access Control Framework for Dis-tributed Applications[Z]. http://gost.isi.edu/info/gaaapi/doc/drafts/frmw_draft5.txt, November (2005)

Google Scholar

[3] DF Ferraiolo, et al. Proposed NIST Standard for Role-Based Access Control[J]. ACM Transactions on Information and System Security, 4(3): p.224–274(2004)

DOI: 10.1145/501978.501980

Google Scholar

[4] G. Brose. A typed access control model for CORBA. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Weidner, editors, Proc. European Symposium on Research in Computer Security(ESORICS), LNCS 1895, pages 88–105. Springer, 2000.

DOI: 10.1007/10722599_6

Google Scholar

[5] J.D. Moffett, M.S. Sloman, Policy hierarchies for distributed systems management, IEEE Journal on Selected Areas in Communications 11 (9) (1993) 1404–1414.

DOI: 10.1109/49.257932

Google Scholar