An ASP Based Approach of Inter-Domain Role Mapping

Article Preview

Abstract:

Although the ANSI RBAC model has achieved great success in the enterprise, it provides no mechanism for the urgent interoperation needs between distributed domains. This paper presents an ASP based approach to extend traditional RBAC model for inter-domain cooperation. We first translate the RBAC models with the IDRM problem into answer set programs, and then compute the solutions via an answer set solver. Finally, we discuss the safety and availability of our approach and ensure the models conflict-free. It is concluded that our approach supports the collaborating environments well with flexible and efficient reasoning abilities.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 706-708)

Pages:

1843-1846

Citation:

Online since:

June 2013

Keywords:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] R.S. Sandhu, E.J. Coynek, H.L. Feinsteink, C.E. Youmank, Role-based Access Control Models, IEEE Computer, vol. 29(2), pp.38-47, 1996.

Google Scholar

[2] S. Du, JBD. Joshi, Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy, Proceedings of the eleventh ACM symposium on Access control models and technologies, ACM, 2006.

DOI: 10.1145/1133058.1133090

Google Scholar

[3] V. Lifschitz, Answer Set Programming and Plan Generation, Artificial Intelligence, vol.138(1), pp.39-54, 2002/

DOI: 10.1016/s0004-3702(02)00186-8

Google Scholar

[4] N. Leone, W. Faber, G. Pfeifer, T. Eiter, G. Gottlob, C. Koch, C. Mateis, S. Perri, F. Scarcello, The DLV System for Knowledge Representation and Reasoning, ACM Transactions on Computational Logic, vol.7(3), p.499–562, 2006.

DOI: 10.1145/1149114.1149117

Google Scholar

[5] M. Shehab, E. Bertino, A. Ghafoor, SERAT: SEcure: role mApping technique for decentralized secure interoperability, Proceedings of the tenth ACM symposium on Access control models and technologies, ACM, p.159–167, 2005.

DOI: 10.1145/1063979.1064007

Google Scholar

[6] L. Chen, J. Crampton, Inter-domain Role Mapping and Least Privilege, Proceedings of the 12th ACM symposium on Access control models and technologies, ACM, p.157–162, 2007.

DOI: 10.1145/1266840.1266866

Google Scholar

[7] A. Gouglidis, M. Ioannis, Role-based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems, Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, p.38–53, 2011.

DOI: 10.1007/978-3-642-21040-2_3

Google Scholar

[8] F. Beibei, L. Xiaoyan, L. yang, B. yang, X. Chunhe, Conflict Detection Model of Access Control Policy in Collaborative Environment, Proceedings of the 2011 International Conference on Computational and Information Sciences, p.377–381, 2011.

Google Scholar

[9] H. Jinwei, L. Ruixuan ,L. Zhengding, Rbac-based Secure Interoperation Using Constraint Logic Programming, Computational Science and Engineering (CSE'09), Vol. 2, p.867–872, IEEE, 2009.

DOI: 10.1109/cse.2009.249

Google Scholar