Definition of Action and Attribute Based Access Control Rules for Web Services
نویسندگان
چکیده
Access control has been found to be one of the effective ways of insuring that only authorized users have access to the information resources to perform their job function. The overall objective of any access control policy rule is to define, sensitive information may be disclosed when, why, how and to whom. In one hand resources should be protected against unauthorized access and in the other hand it should be available for authorized use. Separation of duties (SoD) is a security principle that has been used extensively to prevent conflict of interest, fraud and error control in organizations. In recent years many IT organizations have struggled to identify potential SoD violations within their IT systems. Since new technologies such as SOA widely used in IT systems, in this article we describe two access control model: most recently used which is RBAC model and most suitable for SOA environment which is ABAC and compare them in SoD Issue with an example. We show that failure to capture a business requirement for SoD, and then poor rule definitions can lead to violation. Hence we propose an approach for defining rules, based on subject, resource, environment attributes and the action that would be performed.
منابع مشابه
A combination of semantic and attribute-based access control model for virtual organizations
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملAttribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...
متن کاملPatterns for the eXtensible Access Control Markup Language
Web services are becoming the way for enterprises to interoperate. Many security standards for them have been developed; one of these is XACML (eXtensible Access Control Markup Language). XACML has been defined by OASIS and it includes a policy, an access decision language, and a specialized web services policy language. We present here three architectural patterns for XACML. The XACML Authoriz...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012