Research on the Access-Authorizing-Problem in a Collaborative Manufacturing Platform

Article Preview

Abstract:

Access control on shared resources or information is a high complex problem in a collaborative manufacturing platform since so many design information and manufacturing resources will be created and shared, Meanwhile, security rules or polices from different partners should be obeyed when accessing on these shared resource. Non intuitional semantic of security policies leads to the Access Authorizing Problem (AAP): how do administrators configure an authorizing action sequence to perform the specified assignment task without disobeying these security policies and constraints from different partners or provider In this paper, we define this problem formally at first and model it to a classic planning problem, then employ the GraphPlan algorithm to resolve it. A case is cited to testify the effectiveness of our method and system in the end. The main contribution of the research is to present definition and resolving method to the access authorizing problem, which can help administrators to make correct authorizing decision.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

584-590

Citation:

Online since:

September 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sandhu R., Bhamidipati V. The ASCAA Principles for Next-Generation Role-Based Access Control. In: Proceedings of 3rd International Conference on Availability, Reliability and Security. Barcelona, Spain(2008).

Google Scholar

[2] Sandhu R., Bhamidipati. R, Munawer.R. The ARBAC97 Model for Role-Based Administration of Roles. ACM Transactions on Information and System Security, 2(1): 105-135 (1999).

DOI: 10.1145/300830.300839

Google Scholar

[3] Hu J.W., Li R.X. Lu Z.D. On Role Mappings for RBAC-based Secure Interoperation. In: Proceeding of 2009 Third International Conference on Network and System Security, Wuhan, China (2009).

DOI: 10.1109/nss.2009.76

Google Scholar

[4] Cholvy L., Cuppens F. Analyzing consistency of security policies. In: Proceedings of 1997 IEEE Symposium on Security and Privacy, Oakland, USA (1997).

DOI: 10.1109/secpri.1997.601324

Google Scholar

[5] Chen T.Y., Chen Y.M., Chu H.C. et al. Distributed access control architecture and model for supporting collaboration and concurrency in dynamic virtual enterprises. International Journal of Computer Integrated Manufacturing, 21(3): 301-324(2008).

DOI: 10.1080/09511920701196950

Google Scholar

[6] Jiang Y. Liu W.J. Jin T.G. A Trust Evaluation algorithm for Secure Information Sharing in Collaborative Environment. In: Proceeding of 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, Wuhan, China (2008).

DOI: 10.1109/paciia.2008.204

Google Scholar

[7] Li Q., Zhang X.W., Xu M.W. et al. (2009) Towards secure dynamic collaborations with group-based RBAC model.  Computers & Security, 28(5): 260-275(2009).

DOI: 10.1016/j.cose.2008.12.004

Google Scholar

[8] Lu Y.H., Zhang L., Sun J.G. Task-activity based access control for process collaboration environments. Computers in Industry, 60(6): 403-415(2009).

DOI: 10.1016/j.compind.2009.02.009

Google Scholar

[9] Nasirifard P., Peristeras V.,  Decker S. Annotation-based access control for collaborative information spaces. Computers in Human Behavior 27(4): 1352-1364 (2011).

DOI: 10.1016/j.chb.2010.07.030

Google Scholar

[10] Sun YQ, Gong B., Meng X.X., et al. Specification and enforcement of flexible security policy for active cooperation. Information Sciences, 179 (15): 2629-264(2009).

DOI: 10.1016/j.ins.2009.01.040

Google Scholar

[11] Joshi J.B.D., Bhatti R. , Bertino E. et al. Access Control Language for  Multi-domain Environments. IEEE Internet Computing 8(6): 40-50(2004).

Google Scholar

[12] Shafiq B., Joshi J.B.D., Bertino E. et al. (2005). Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies. IEEE Transactions on Knowledge and Data Engineering. 17(11): 1557-1577.

DOI: 10.1109/tkde.2005.185

Google Scholar

[13] Blum A, Furst M. Fast planning t hrough planning graph analysis. In: Proceedings of the 14th International Joint Conference on Artificial Intelligence, Québec, Canada(1995).

Google Scholar

[14] Blum A, Furst M L. Fast planning through planning graph analysis. Artificial Intelligence, 90(1-2): 281-300(1997).

DOI: 10.1016/s0004-3702(96)00047-1

Google Scholar