Modeling Role-Based Access Control in ISCO
نویسنده
چکیده
In this article we describe the mechanisms offered by the ISCO [2, 1] language for defining and implementing access control and homologation, within the scope of a large-scale information system. ISCO is a Logic-based system which integrates multiple heterogenous information sources such as classical relational databases or LDAP directories. The rule-based access control mechanisms present in ISCO can be used to implement a wide variety of access control policies, ranging from simple owner/group/other permissions to role-based access control with capabilities which extend further, such as content filtering, as we shall demonstrate. We claim that the access control mechanisms that can be implemented using ISCO subsume existing ones in expressiveness. An example of usage within a real-world application is also provided.
منابع مشابه
A semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملEstablishing Role-based Access Control in Viewpoint-oriented Variability Management
Process roles are used to structure complex engineering processes in single systems development for many years. Typically, each role has specific responsibilities from which certain information demands originate. In the engineering of variable software, role-specific information demands affect variability information. To control the access to the variability information, we suggest using the co...
متن کاملAn Analysis of Accessibility to Services in Rural Areas and Structural Modeling of Factors affecting it; Case Study: Central District of Tabriz County
Access, plays an important role in rural development as there is a meaningful relationship between rural development and access to infrastructure services. Villages that have less access to essential services, especially transport, faced with a lot of structural and socio-economic constraints, which are obstacles to sustainable rural development. The present study seeks to examine the accessibi...
متن کامل