Trusted Database Interoperation Based on Collaborative Role-Based Access Control

نویسندگان

  • Hyung Chan Kim
  • R. S. Ramakrishna
  • Kouichi Sakurai
  • Wook Shin
چکیده

The increasing development of distributed application has led to the widespread involvement of database interconnection. Information sharing through the interconnection requires a new type of access control beyond local-only access control scheme: we need to consider the relationship among organizations and a collaborative application. In this paper, we describe an access control framework for the trusted database interoperation based on the collaborative role-based access control model. The cooperation is realized by the construction of virtual role hierarchy for the collaborative application extending the conventional role based access control model. The policy mediator for the application achieves the integration of heterogeneous local datasources which may be under different security policies.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Trust-Based Constraint-Secure Interoperation for Dynamic Mediator-Free Collaboration

By collaboration, domains share resources effectively. To maintain security properties of individual domains during collaboration is a key issue. When domains employing heterogeneous RBAC policies collaborate via crossdomain role-role mappings, their locally-defined separation of duty constraints face the risk of breaching. We present the requirements for constraint-secure interoperation, prohi...

متن کامل

A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment

The research communitiy has shown considerable interest in studying access control in single Trusted Operating Systems (TOS). However, interactions among multiple TOSs have attracted relatively little attention. In this paper, we propose a Collaborative Role-Based Access Control (C-RBAC) model for distributed systems in which accesses across system domain boundaries are allowed. Access entities...

متن کامل

Privacy-preserving Semantic Interoperation of Heterogeneous Databases

Two major challenges to enabling secure interoperation among web-information sources are resolving semantic heterogeneity across websites and maintaining the privacy of the data and metadata of organizations owning the websites. In this paper, we propose SACE, a novel, implemented middleware toolkit that enables privacy-preserving secure semantic access control and allows queries to be answered...

متن کامل

Secure Interoperation in Multidomain Environments Employing UCON Policies

Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authorization decisions based on subjects’ permissions on target objects, and there is no further enforcement during the access. Recently proposed usage control (UCON) can address these requirements of acc...

متن کامل

Secure Internet Applications Based on Mobile Agents

The increasing importance of the Internet has motivated the exploration of new execution models based on mobile and dynamic entities to overcome the limits of the client/server model traditionally used to develop Internet applications. In this research, an Enhanced Role-based access control model (ERBAC) and an architecture for the ERBAC model are proposed. The architecture based on mobile agen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005