An Extended UCON Model Supporting Distributed Multidomain Applications

Article Preview

Abstract:

This paper presents security rules summarized from the analysis of an distributed multidomain application. The paper proposes extensions to the core UCON model to address typical problems and requirements in the distributed multidomain environment such as: dynamic attributes, delegation authorization mechanism. The paper gives the definition of the important part of the extended UCON model such as: the basic sets, the system assertions and the actions.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

5616-5619

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Kapadia, J. Al-Muhtadi, R. Campbell, and D. Mickunas, IRBAC 2000: secure interoperability using dynamic role translation, Proceedings of 1st International Conference on Internet Computing, (2000).

Google Scholar

[2] E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti, DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments, " Proc. 22nd Int'l Conf. Distributed Computing Systems (ICDCS , 02), July 2002, pp.411-420.

DOI: 10.1109/icdcs.2002.1022279

Google Scholar

[3] J. Park, R. Sandhu, The UCON ABC Usage Control Model, , ACM Trans. Information and Systems Security, vol. 7, no. 1, 2004, p.128–174.

DOI: 10.1145/984334.984339

Google Scholar

[4] R. Sandhu, P. Samarati, Access Control: Principles and Practice, IEEE Communications Magazine, September 1994, p.40–48.

Google Scholar

[5] D. Ferraiolo, R. Sandhu, and S. Gavrila, D. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol. 4, no. 3, 2001, p.224–274.

DOI: 10.1145/501978.501980

Google Scholar

[6] G. Russello, N. Dulay, Cross domain usage control through shared data spaces, the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks, Washington, DC, USA: IEEE Computer Society, 2009, p.178–181.

DOI: 10.1109/policy.2009.18

Google Scholar

[7] J. Park, R. Sandhu, A Vision for Next Generation Access control, Proceedings of The 2nd Intemational Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, 2003, p.17–31.

Google Scholar

[8] Z. D. Li, X. J. Ye, Towards a Dynamic Multi-Policy Dissemination control Model(DMDCON), ACM SIGMOD Record, 2006, p.33–38.

DOI: 10.1145/1121995.1122001

Google Scholar

[9] X. ZHANG, J. PARK, F. PARISI-PRESICCE, et al, A logical specification for usage control, ACM Symposium on Access Cotrol Models and Technologies, 2004, p.1–26.

DOI: 10.1145/990036.990038

Google Scholar

[10] T. JAEGER, J. E. TIDSWELL, Practical safety in flexible access control models, ACM Transactions on Information and Systems Security, 2001, p.34–58.

DOI: 10.1145/501963.501966

Google Scholar