Request-driven role mapping framework for secure interoperation in multi-domain environments
نویسندگان
چکیده
This paper proposes a request-driven role mapping framework for secure interoperation in multi-domain environments. To support flexible policy expression and inter-domain policy mapping, we present a convenient and effective method to perform the privilege query in general hybrid role hierarchies for special external requests based on the minimal unique set (MUS). Role mappings are the basic approach for the interoperation among multiple individual domains. To describe the relationships between roles practically, role mappings are divided into three types: I-mapping, A-mapping and IA-mapping. These mappings denote the forms of the different role hierarchies respectively. Role mappings are the major causes for various types of conflicts and inconsistencies in multi-domains. This paper analyses the reasons for generating these conflicts and presents the algorithms to resolve them. Compared to other researches, this method can ensure that the external user requests will be satisfied and the local role hierarchies will be furthest preserved. Finally, the study of the instance for interoperation among the various offices of a county shows the validity of this role mapping framework.
منابع مشابه
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments
A key challenge in emerging multi-domain open environments is the need to establish trust-based, loosely coupled partnerships between previously unknown domains. An efficient trust framework is essential to facilitate trust negotiation based on the service requirements of the partner domains. While several trust mechanisms have been proposed, none address the issue of integrating the trust mech...
متن کاملSecure Interoperation in Multidomain Environments Employing UCON Policies
Ensuring secure interoperation in multidomain environments based on role based access control (RBAC) has drawn considerable research works in the past. However, RBAC primarily consider static authorization decisions based on subjects’ permissions on target objects, and there is no further enforcement during the access. Recently proposed usage control (UCON) can address these requirements of acc...
متن کاملX - Rbac : an Access Control Language for Multi - Domain Environments
A multi-domain application environment consists of distributed multiple organizations, each employing its own security policy, allowing highly intensive inter-domain accesses. Ensuring security in such an environment poses several challenges. XML technologies are being perceived as the most promising approach for developing pragmatic security solutions for such environments because of the integ...
متن کاملRole-Based Secure Inter-operation and Resource Usage Management in Mobile Grid Systems
Dynamic inter-domain collaborations and resource sharing comprise two key characteristics of mobile Grid systems. However, interdomain collaborations have proven to be vulnerable to conflicts that can lead to privilege escalation. These conflicts are detectable in interoperation policies, and occur due to cross-domain role relationships. In addition, resource sharing requires to be enhanced wit...
متن کاملA Cross - Domain Role Mapping and Authorization Framework for RBAC in Grid Systems
Highly computational resource sharing environments like grids pose major security issues. Secure interoperability has been a growing concern for such multi domain computing systems. Collaboration in such a diverse environment requires integration of all local policies to compose a global access control policy for controlling information and resource. Access control in such an environment is sti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Comput. Syst. Sci. Eng.
دوره 23 شماره
صفحات -
تاریخ انتشار 2008