Security Policy Conflict Detection for Distributed System

Article Preview

Abstract:

Distributed applications require integrating security policies of collaborating parties, and the policies must be able to support complex authorization specifications and conflicts of policies must be able to be detected. In this paper, we introduce a policy for fine-grained access control which is able to support the specifications with sufficient policy constraints, and then we present a methodology based on semantics to detect whether there are policy conflicts and then produce the XACML policy document.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 282-283)

Pages:

173-176

Citation:

Online since:

July 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] DF Ferraiolo, et al. Proposed NIST Standard for Role-Based Access Control[J]. ACM Transactions on Information and System Security, 4(3): p.224–274(2004).

DOI: 10.1145/501978.501980

Google Scholar

[2] G. Brose. A typed access control model for CORBA. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Weidner, editors, Proc. European Symposium on Research in Computer Security(ESORICS), LNCS 1895, pages 88–105. Springer, (2000).

DOI: 10.1007/10722599_6

Google Scholar

[3] J.D. Moffett, M.S. Sloman, Policy hierarchies for distributed systems management, IEEE Journal on Selected Areas in Communications 11 (9) (1993) 1404–1414. http: /gost. isi. edu/info/gaaapi/doc/drafts/frmw_draft5. txt, November (2005).

DOI: 10.1109/49.257932

Google Scholar

[4] Richard W.C. Lui, et al. Role Activation Management in Role Based Access Control[C]. ACISP, pp.358-369(2008).

Google Scholar

[5] Tatyana Ryutov, et al. Access Control Framework for Distributed Applications[Z].

Google Scholar