Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs
|
|
- Rhoda Clarke
- 5 years ago
- Views:
Transcription
1 Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs Romuald Thion and Stéphane Coulondre LIRIS: Lyon Research Center for Images and Intelligent Information Systems, Bâtiment Blaise Pascal (501), 20, avenue Albert Einstein, Villeurbanne Cedex, France Abstract. This paper focuses on two aspects of access control: graphical representation and reasoning. Access control policies describe which operations are granted to which users, w.r.t. some resources. The Rolebased access control introduces the concept of role to model user permissions. Currently, there is a need for tools allowing security officers to graphically describe and reason on their policies. Thanks to conceptual graphs, we can provide a consistent graphical formalism for role-based access control policies, which is able to deal with particular features such as role hierarchy and constraints. Moreover, once a policy is modelled by CGs, graph rules and inference procedures can be used to reason on it; This allows security officers to understand why some permissions are granted or not and to detect whether integrity constraints are violated. 1 Introduction Opening our information systems to the world-wide web is really seducing, but highlights a problem which becomes more and more crucial: security. Nowadays, every on-line computer must be equipped with security update agent, firewall, anti-virus software and even anti-spyware, otherwise within a few minutes information system can become the target of automated scanning scripts, hackers, malicious websites, etc.: security is now of main importance. In this paper, we are dealing with a particular aspect of security process: access control. 1.1 Reasoning on access control policies Access control denotes the fact of determining whether a user (process, computer, human user, etc.) is able to perform an operation (read, write, execute, delete, search, etc.) on an resource (a tuple in a database, a table, an object, a file, etc.). An operation right on a resource is called permission. Access control policies describes define the users rights on resources, in order to enforce security of an organization. As a matter of fact, a large part of flaws in information systems are due to administration mistakes or security misconceptions: the number of users is increasing, rules are more and more complex, constraints are introduced to deal
2 2 with border-line cases. As policy engineering is considered to be of high pratical importance [4], we do think there is a need for tools facilitating design and maintenance of security policies, to avoid mistakes and misconceptions. Such tools need to meet several requirements: have an appropriate graphical interface, be able to capture access control model mechanisms and constrainted policies, be able to check consistency of policies, be able to answer queries for particular permissions or relation holdings in the policies, have comprehensible inference mechanism, even by non-logicians. According to [5], we do think that such functionnalities cannot be designed without a proper formal framework. 1.2 Why conceptual graphs? Rather than tailoring a dedicated fragment of first-order logic [6](FOL) or using a pure logic-based approach [5, 4] with traditional resolution methods (such as Robinson principle), we focused on conceptual graphs (CGs) and their dedicated inference procedures. The CGs framework meets the requirements described in section 1.1: CGs is a formal system (using the function Φ gives a straight equivalence in FOL), the CGs support can model complex structures such as hierarchies, individual markers and graph rules are expressive engough to capture authorization mechanisms of access control models, chaining procedures allow direct graphical-based inferences on graphs. This paper presents how to use the conceptual graphs framework to design and infer on Role-Based Access Control (RBAC) policies. CGs applied on RBAC allow graphical representation of policies and graph rules inferences can capture underlying authorization mechanisms and allows reasoning on policies. 2 Fundamentals 2.1 Role Based-Access Control Policies Role-Based Access Control models constitute a family in which permissions are associated with roles (roles can be seen as collections of permissions), and users are made members of appropriate roles. The definition of a role is quoted from [12]: A role is a job function or job title within the organization with some associated semantics regarding the authority and responsibility conferred on a member of the role.
3 3 Figure 1 is common representation of the RBAC model. In this figure, URA is a short for user-role assignment and PRA for permission-role assignment. In the RBAC model, permissions are not directly assigned to users. Thus, access to a resource is granted to a user if he/she endorses a role which is assigned to this permission. The role hierarchy is a way of minimizing the number of roles in RBAC policies: a role specializing another one inherits all its permissions. As the major part of access control decisions is based on user functions or jobs, the introduction of roles greatly simplifies policies management. Since roles in an organization are usually stable with respect to users turnover and tasks reassignment, RBAC provides a powerful mechanism for reducing complexity, cost, and mistakes sometimes entailed by permission management [1]. RBAC was found to be among the most attractive solutions for providing access control in e-commerce, e-government or e-health, and is also a very active research field. However, organizations may involve thousands of roles [10] and administration of RBAC policies can still be complex. Graphical based modelling and reasoning is a step beyond easy-to-use policy administration interfaces and better comprehension of policies. Fig. 1. RBAC Model (no specific formalism) 2.2 Representation and reasoning with conceptual graphs The following definitions are quoted from [11]. A rule R : G 1 G 2 is composed of two CGs G 1 and G 2, respectively called hypothesis and conclusion. There may be co-reference links between concepts of G 1 and G 2. There are no constraints on types for individual markers common to G 1 and G 2 : the type considered in operations is the smallest type that can be associated with the marker. We call a support the structure that represents the ontology for a specific domain application, it is composed a concept type lattice and a relation type set. A knowledge base is composed of a support S, a set of simple CGs (facts), and a set of rules.
4 4 Forward chaining is typically used in order to enrich knowledge base with new facts, implicitly present in the base [11]. It is used to prove a goal graph G goal is implied by a knowledge base KB. Main idea is to calculate the closure of the set of facts of KB by the set of rules of KB. Basic outline of procedure is: chose a rule R from KB, let be G a fact from KB. If G fullfills the hypothesis of R, then the conclusion of R can be added to KB, if it is not already present (to avoid redundant informations), repeat until no new facts can be produced, if there exists a projection from G goal to facts from KB, then G goal is implied by the knowledge base. This knowledge addition principle is the graph dual of bottom-up resolution approach in first-order logic. Backward chaining is typically used to find a linear resolution of a goal (a request). Whereas forward chaining acts from facts to goal, backward chaining is top-down: from conclusion (G goal ) to hypothesis (the facts from KB). Here we use the piece unification [11]. The basic outline of this procedure is: find a rule on which the goal can unify by pieces, remove the piece from the goal, add the specialized rule hypothesis to the goal, which produces a new subgoal, repeat until the subgoal is empty. 3 Conceptual Graphs for RBAC representation and inference In section 2, we described the role-based access control model and we outlined two inference procedures. In this section we present how a knowledge base can model a RBAC policy. A knowledge base is composed of a support S, a set of simple CGs (facts), and a set of rules. 3.1 Modelling basic concepts of RBAC The core elements of RBAC models are described in figure 1. For sake of readability, we do not include sessions (which lead to more complex authorization rules) in examples. Indeed, according to [2], it is possible to model sessions by adding a special relation. The support must include the following concepts and relations: Role concept type, Resource concept type,
5 5 Operation concept type, User concept type, ura of arity 2 (User,Role) relation type, pra of arity 3 (Role,Operation,Resource) relation type. Once the RBAC model is translated into a conceptual graph support, we need to add the different roles, users, operations and resources involved in the policy: for each resource within the policy, add a conformity relation resource id : Resource, for each role within the policy, add a conformity relation role id : Role, for each operation within the policy, add a conformity relation operation id : Operation, for each user within the policy, add a conformity relation user id : User. Fig. 2. user-role and role-permission assignments sample graph Once the basic concepts and relations are created, the next step towards a complete modelling of a RBAC policy (figure 1) is to translate user-role and permission-role assignment. The authorization decision in RBAC is based on user role assingments: a user is granted access to a resource if he/she is assigned to a role which is assigned to this permission (possibly through inheritance). The user-role and permission-role assignments are translated into the knowledge base by a set of simples CGs, called facts. The facts describe which roles are granted to users, and which operations are granted to roles. The figure 2 is an example of these assignments. In this graph, the user Bob is made member
6 6 of roles student and phdstudent (multiple user-role assignment), the user Charly is made member of the role lecturer, and the user Alice is made member of the role postphd. The role teacher is granted write access on resource test and the role student is granted execute access on resource test. Thus, we need to add some facts into the knowledge base: for each permission-role assignment in the policy, add a relation pra between the role, the operation and the resource into the knowledge base, for each user-role assignment in the policy, add a relation ura between the user and his/her roles into the knowledge base. 3.2 Modelling role hierarchy Fig. 3. A sample role hierarchy (no specific formalism) Figure 3 is a sample role hierarchy. For example, a user assigned to a role Sr. Lecturer will be granted every permissions granted to role Lecturer, Teacher and Researcher. Graph rules are used to represent the inheritance relation properties. Direct inheritance (e.g. Lecturer directly inherits permissions from both Teacher and Researcher roles) is modelled by an annex relation seniordirect. The complete inheritance relations are modelled with the senior relation. To model the RBAC inheritance in conceptual graphs, we need to: add the relation type seniordirect of arity 2 (Role,Role) to the support, add the relation type senior of arity 2 (Role,Role) to the support, add an order relation seniordirect < senior, add a graph rule (figure 4) settling that the inheritance relation is reflexive, add a graph rule (figure 5) settling that the inheritance relation is transitive,
7 7 add direct inheritance relations between roles to the knowldedge base (e.g. to model edges in the figure 3). Inheritance is used for authorization decision: a user is granted access to a resource, if he/she is made member of a role which inherits this access (a role also inherits itself). Fig. 4. A role inherits itself Fig. 5. Role inheritance is transitive 3.3 Modelling authorization decision mechanism and specific constraints The last step for modelling RBAC policies is to create a rule in the knowledge base for authorization decision. A user is granted access to a resource if he/she is assigned to a role which is assigned to this permission. Thus, a relation permitted of arity 3 (User, Operation, Resource) is added to the support, modelling which users are granted access. The graph rule given in figure 6 expresses how users are granted access on resources. This rule can be refered to as the core rule of the RBAC model. In the RBAC model, constraints are introduced to reflect peculiarities of organizations. Examples of such constraints are exclusions (e.g. no user can be
8 8 assigned both mutually exclusive roles) and prerequisites (e.g. if a user is assigned to a role in the policy, another user must be assigned prerequisited role, or each user must be assigned to at least one role). Both these constraints type can be modelled by graph rules. Other organization specific constraints can be expressed with CGs. For example, we can add a rule stating that the root role inherits all other ones. Fig. 6. The authorization decision rule 3.4 Reasoning on policies This subsection describes how graph rules inferences can be used to reason on RBAC policies. Our knowledge base includes: a set of concepts, the core elements of RBAC, a set of relation, used to model hierarchy, assignments and authorization, the core relations of RBAC, a set of rules, modelling properties of role inheritance, authorization core rule, constraints, a set of facts, modelling the users, roles, operations, resources and inheritance relations present in the policy. Given a query, graph rules inferences allow security officers (SOs): to know granted permissions,
9 9 to query the policy on more complex statements (e.g. figure 8), to find inconsistencies, to graphically follow the authorization mechanism, to test if adding new facts, new rules or modifying actual permission is coherent. Fig. 7. No user can be permitted both execute and write access on tests Let us consider a SO working on the university toy RBAC policy. Role hierarchy is described in figure 3, facts are pictured in figure 2, rules governing role inheritance and authorization mechanism are included in this knowledge base. The SO is defining constraints on the RBAC policy, to fit as best as possible the policy to his organization. In order to avoid any student from enter his/her own mark on a test, the SO adds the exclusion rule no user can be both granted execute and write access on tests (figure 7). He then runs an inference procedure on his policy to know if this new constraints produces an inconsistency... And it does! Following the steps of the inference, he is able (whitout specific requirements on resolution principle) to understand why this constraint can not be added to the policy. We illustrate here the backward chaining inference procedure, which starts with a graph goal modeling the inconsistency. The procedure is outlined as follows (the complete illustration can be found in annex) : there is an inconsistency if a user is both granted execute and write access on tests (step 1 to step 2), a user is granted access through his/her roles (step 2 to step 4), role student is execute granted access on test (step 4 to step 5) role teacher is write granted access on test (step 4 to step 5), a role inherits permissions of its siblings, role PostPhD inherits both roles student and teacher (step 5 to step 9), Alice is granted role PostPhD (step 9 to step 11),
10 10 thus the policy is not consistent according to the new rule. This example points out how an adequate graphical tool for RBAC policy can be useful for modelling purposes. Without such an inference tool, an SO can happen to add some contraints which can be violated but not detected, until he receives a complain from PostPhD users who may not login in the system anymore. Fig. 8. A sample query 4 Discussion In this paper, we have shown how to use the conceptual graphs framework to design and infer on role-based access control (RBAC) policies. Such inferences can be used to check policies consistency and to answer queries in order to formally test or debug policies. CGs have an appropriate graphical interface useful for specifying policies and especially for explaining inferences to security engineers. 4.1 Graphical representation of Role-Based Access Control Policies In [8], the authors point out that in order to avoid inconsistencies, it is appropriate to have a precise modelling of access control rules (their work is based on RBAC-like examples), and a visual modelling to make administration tasks easier. Their paper compare readability and checking ability of three approaches. The first approach is based on UML. The second model studied is Alloy: a structural modelling language based on first-order logic, for expressing complex structural constraints and behaviour. Finally, the third model is Graph Transformations. It is a graph model where transformation rules, which are rewriting rules, are used to deduce all possible knowledge. When a new constraint (e.g., mutually exclusive roles) is added to a given policy, these models can verify if the resulting policy is inconsistant, and give a counterexample. Nevertheless, the paper mainly focused on constraints: those
11 11 tools do not answer questions such as which roles are allowed to execute this operation on this object, or other more complex queries. Indeed, UML is only a semi-formal model, Allow Constraint Analyser is a consistency checker, and Graph Transformations do not have FOL logical semantics. In [14], the authorization schema is described using Dynamically Types Access Control (DTAC) graphical formalism. The authors aim at graphically represent RBAC schemas. However they do not propose an inference method in order to ask queries or to check for inconsistencies. 4.2 Reasoning on Role-Based Access Control Policies In [2], constraint logic programming (CLP: first order predicate calculus + linear constraints over integers / rationals / reals, e.g., Prolog + CLP library) is used to express and infer on RBAC policy. The authors describe access control programs able to deal with roles hierarchy and objects hierarchy. The authors of [6] describe a fragment of FOL which is tractable and sufficiently expressive to capture policies for many applications. This work is really interesting and points out tractability and complexity results on their logic. Unfortunately, the authors did not investigate deeply some emerging problems when dealing with complex access control models involving abstract container between users and permissions (e.g.: groups, roles, tasks, etc.) and their hierarchies. We do agree with the authors statement about the use of logic programming by non-logicians, but we do not agree that a filling the blank on English sentences interface is sufficient for security administrators. We think that administrators must have a computer-aided software engineering (CASE) interface to design and check policies built on a consistent graphical model. Moreover such CASE should provide a comprehensible reasoning trace, which can be provided through graph operations (e.g. projection of a query onto the set of facts) 4.3 Modelling sessions and Administrative RBAC models For sake of clarity the example exposed in this paper does not include sessions. We are investigating the interest of chase procedure to check RBAC policies involving sessions. For example, using chase procedure we might answer queries like Are the policies consistent for all possible sessions?. Moreover, incorporating the model for administration of roles exposed in [13] is promising for distributed policies verification purpose. 4.4 Modelling role hierarchy using concept lattice One could notice that the conceptual graphs concept lattice might be useful to model the RBAC role hierarchy. While it is indeed well suited for role hierarchy modeling, some problems arise when it comes to describing relations between roles, resources and users. For example, a graph rule is not well-suited for modeling the fact that if a user is assigned two differents roles, then an inconsistency
12 12 holds. Indeed, it may require a coreference link between two generic markers within the same hypothesis, which adds additional graphical elements. We think is it not desirable, however it is still possible. 4.5 Modelling extended RBAC models The RBAC family includes some extensions, for example TRBAC [3], GTR- BAC [7], Context-Sensitive RBAC [9], etc. Such extensions cannot be taken in considerations in the present CGs model. Indeed, it may require the expression of built-in (i.e. whose semantics is hard-coded) concepts and relations such as linear constraints, set constraints, etc. Therefore we plan to study the extension of the CGs graphical formalism and inferences to arbitrary built-in elements. References 1. Ahn, G.-J., Sandhu, R. S.: Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3 (2000) Barker, S., Stuckey, P. J.: Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur. 6 (2003) Bertino, E., Bonatti, P. A., Ferrari, E.: TRBAC: A temporal Role-Based Access Control model. ACM Trans. Inf. Syst. Secur. 4 (2001) Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM Trans. Inf. Syst. Secur. 6 (2003) Bonatti, P. A., Samarati, P.: Logics for authorization and security. Logics for Emerging Applications of Databases. (2003) Halpern, J. Y., Weissman, V.: Using first-order logic to reason about policies. CSFW. (2003) Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control model. IEEE Transactions on Knowledge and Data Engineering. 17 (2005) Koch, M., Parisi-Presicce, F.: Visual specifications of policies and their verification. FASE. Lecture Notes in Computer Science 2621 (2003) Kumar, A., Karnik, N. M., Chafle, G.: Context sensitivity in Role-Based Access Control. Operating Systems Review. 36 (2002) Roeckle, H., Schimpf, G., Weidinger, R.: Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. ACM Workshop on Role-Based Access Control. (2000) Salvat, E., Mugnier, M.-L.: Sound and complete forward and backward chaining of graph rules. ICCS. Lecture Notes in Computer Science 1115 (1996) Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E.: Role-Based Access Control models. IEEE Computer. 29 (1996) Sandhu, R. S., Munawer, Q.: The ARBAC99 model for administration of roles. ACSAC. (1999) Tidswell, J., Potter, J.: A graphical definition of authorization schema in the DTAC model. ACM Symposium on Access Control Models and Technologies. (2001)
13 13 Annex: a graphical backward reasoning We here show the backward inference steps of section 3.4. The dotted lines show the pieces which are removed in every step by application of backward chaining.
14 14
Analysis of TRBAC with Dynamic Temporal Role Hierarchies
Analysis of TRBAC with Dynamic Temporal Role Hierarchies Emre Uzun 1, Vijayalakshmi Atluri 2, Jaideep Vaidya 1, and Shamik Sural 3 1 MSIS Department, Rutgers Business School, USA {emreu,jsvaidya}@cimic.rutgers.edu
More informationIntegrity Constraints For Access Control Models
1 / 19 Integrity Constraints For Access Control Models Romuald THION, Stéphane COULONDRE November 27 2008 2 / 19 Outline 1 Introduction 2 3 4 5 3 / 19 Problem statement From Role-BAC to time (Generalized-Temporal-RBAC,
More informationHybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model James B. D. Joshi #, Elisa Bertino *, Arif Ghafoor # Center for Education and Research in Information Assurance and Security
More informationTowards Modal Logic Formalization of Role-Based Access Control with Object Classes
Towards Modal Logic Formalization of Role-Based Access Control with Object Classes Junghwa Chae École Polytechnique de Montréal Montréal, Québec, Canada chae@cse.concordia.ca Abstract. This paper addresses
More informationRBAC: Motivations. Users: Permissions:
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
More informationA Framework for Enforcing Constrained RBAC Policies
A Framework for Enforcing Constrained RBAC Policies Jason Crampton Information Security Group Royal Holloway, University of London jason.crampton@rhul.ac.uk Hemanth Khambhammettu Information Security Group
More informationInformation Security CS 526
Information Security CS 526 Topic 23: Role Based Access Control CS526 Topic 23: RBAC 1 Readings for This Lecture RBAC96 Family R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-Based Access
More informationData Security and Privacy. Topic 8: Role Based Access Control
Data Security and Privacy Topic 8: Role Based Access Control Plan for this lecture CodeShield: towards personalized application whitelisting. Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:
More informationUML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept
UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept Aneta Poniszewska-Maranda Institute of Information Technology, Technical University of Lodz, Poland
More informationEnabling Verification and Conformance Testing for Access Control Model
Enabling Verification and Conformance Testing for Access Control Model Hongxin Hu and Gail Joon Ahn The University of North Carolina at Charlotte {hxhu,gahn}@uncc.edu ABSTRACT Verification and testing
More informationCS590U Access Control: Theory and Practice. Lecture 12 (February 23) Role Based Access Control
CS590U Access Control: Theory and Practice Lecture 12 (February 23) Role Based Access Control Role-Based Access Control Models. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. IEEE Computer,
More informationTowards a Logical Reconstruction of Relational Database Theory
Towards a Logical Reconstruction of Relational Database Theory On Conceptual Modelling, Lecture Notes in Computer Science. 1984 Raymond Reiter Summary by C. Rey November 27, 2008-1 / 63 Foreword DB: 2
More informationFormal Specification for Role Based Access Control User/Role and Role/Role Relationship Management
Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management Serban I. Gavrila VDG Inc. 6009 Brookside Drive Chevy Chase, MD 20815 gavrila@csmes.ncsl.nist.gov John
More informationTemporal Hierarchy and Inheritance Semantics for GTRBAC
CERIAS Tech Report 2001-52 Temporal Hierarchy and Inheritance Semantics for GTRBAC James B. D. Joshi 1, Elisa Bertino 2, Arif Ghafoor 1 Center for Education and Research in Information Assurance and Security
More informationAdvanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96
Advanced Access Control In many cases, identity is a bad criteria for authorization. We examine two modern paradigms for access control, which overcome this limitation: 1. Role-Based Access Control 2.
More informationConflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences
xorbac Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria
More informationDetecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context
Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Sigrid Schefer 1, Mark Strembeck 1, Jan Mendling 2, and Anne Baumgrass 1 1 Institute for Information
More informationDetecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context
Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Sigrid Schefer 1, Mark Strembeck 1, Jan Mendling 2, and Anne Baumgrass 1 1 Institute for Information
More informationRole-Evolution in Role-based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University, Puducherry, India
International Journal of Emerging Research in Management &Technology Research Article July 2017 -Evolution in -based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University,
More informationRBAC POLICY IMPLEMENTATION FOR SQL DATABASES
RBAC POLICY IMPLEMENTATION FOR SQL DATABASES Steve Barker King s College, U.K. Paul Douglas Westminster University, U.K. Abstract We show how specifications of role-based access control (RBAC) and temporal
More informationAn Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 49-61 (2006) An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model CUNGANG
More informationEfficient Policy Analysis for Evolving Administrative Role Based Access Control 1
Efficient Policy Analysis for Evolving Administrative Role Based Access Control 1 Mikhail I. Gofman 1 and Ping Yang 2 1 Dept. of Computer Science, California State University of Fullerton, CA, 92834 2
More informationExtended RBAC With Blob Storage On Cloud
Extended RBAC With Blob Storage On Cloud Mamoon Rashid Research Scholar Department Of Computer Science Engineering Ramgharia Institute of Engineering and Technology Phagwara, Punjab, India. Email: mamoon873@gmail.com.
More informationOperational Semantics
15-819K: Logic Programming Lecture 4 Operational Semantics Frank Pfenning September 7, 2006 In this lecture we begin in the quest to formally capture the operational semantics in order to prove properties
More informationChapter 3. Set Theory. 3.1 What is a Set?
Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any
More informationSecure Role-Based Workflow Models
Secure Role-Based Workflow Models Savith Kandala and Ravi Sandhu Savith Kandala Ravi Sandhu CygnaCom Solutions. SingleSignOn.Net and George Mason University (An Entrust Technologies Company) Dept. of Information
More informationWeb Services Annotation and Reasoning
Web Services Annotation and Reasoning, W3C Workshop on Frameworks for Semantics in Web Services Web Services Annotation and Reasoning Peter Graubmann, Evelyn Pfeuffer, Mikhail Roshchin Siemens AG, Corporate
More informationDiscretionary and Mandatory Controls for Role-Based Administration
Discretionary and Mandatory Controls for Role-Based Administration Jason Crampton Information Security Group, Royal Holloway, University of London jason.crampton@rhul.ac.uk Abstract. Role-based access
More informationSpecification and Enforcement of Access Control in Heterogeneous Distributed Applications
Specification and Enforcement of Access Control in Heterogeneous Distributed Applications Torsten Fink, Manuel Koch, and Cristian Oancea Institut für Informatik Freie Universität Berlin, 14195 Berlin,
More information3.4 Deduction and Evaluation: Tools Conditional-Equational Logic
3.4 Deduction and Evaluation: Tools 3.4.1 Conditional-Equational Logic The general definition of a formal specification from above was based on the existence of a precisely defined semantics for the syntax
More informationAN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA
AN EFFECTIVE FRAMEWORK FOR EXTENDING PRIVACY- PRESERVING ACCESS CONTROL MECHANISM FOR RELATIONAL DATA Morla Dinesh 1, Shaik. Jumlesha 2 1 M.Tech (S.E), Audisankara College Of Engineering &Technology 2
More informationModeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments
Modeling Context-Aware RBAC Models for Business Processes in Ubiquitous Computing Environments Sigrid Schefer-Wenzl, Mark Strembeck Institute for Information Systems and New Media Vienna University of
More informationUML-Based Conceptual Modeling of Pattern-Bases
UML-Based Conceptual Modeling of Pattern-Bases Stefano Rizzi DEIS - University of Bologna Viale Risorgimento, 2 40136 Bologna - Italy srizzi@deis.unibo.it Abstract. The concept of pattern, meant as an
More informationAlloy: A Lightweight Object Modelling Notation
Alloy: A Lightweight Object Modelling Notation Daniel Jackson, ACM Transactions on Software Engineering, 2002 Presented By: Steven Stewart, 2012-January-23 1 Alloy: 2002 to present Software is built on
More informationSupporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model
International Journal of Computer and Communication Engineering, Vol. 3, No. 3, May 2014 Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model Ha
More informationImproving Adaptive Hypermedia by Adding Semantics
Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk
More informationAN ACCESS CONTROL AND TRUST MANAGEMENT FRAMEWORK FOR LOOSELY-COUPLED MULTIDOMAIN ENVIRONMENTS. Yue Zhang. Submitted to the Graduate Faculty of
AN ACCESS CONTROL AND TRUST MANAGEMENT FRAMEWORK FOR LOOSELY-COUPLED MULTIDOMAIN ENVIRONMENTS by Yue Zhang B.S. in Computer Science Department, Nanjing University of Science and Technology, 2004 Submitted
More informationEnforcing Privacy as Access Control in a Pervasive Context
Author manuscript, published in "CCNC 2012 - Consumer Communications and Networking Conference, Las Vegas, NV : United States (2012)" DOI : 10.1109/CCNC.2012.6181011 Enforcing Privacy as Access Control
More informationTowards Coq Formalisation of {log} Set Constraints Resolution
Towards Coq Formalisation of {log} Set Constraints Resolution Catherine Dubois 1, Sulyvan Weppe 2, 1. ENSIIE, lab. Samovar, CNRS, Évry, France 2. ENSIIE, Évry, France Abstract. The language {log} is a
More informationINCONSISTENT DATABASES
INCONSISTENT DATABASES Leopoldo Bertossi Carleton University, http://www.scs.carleton.ca/ bertossi SYNONYMS None DEFINITION An inconsistent database is a database instance that does not satisfy those integrity
More informationConjunctive queries. Many computational problems are much easier for conjunctive queries than for general first-order queries.
Conjunctive queries Relational calculus queries without negation and disjunction. Conjunctive queries have a normal form: ( y 1 ) ( y n )(p 1 (x 1,..., x m, y 1,..., y n ) p k (x 1,..., x m, y 1,..., y
More informationAdministration of RBAC
Administration of RBAC ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Fall 2005 RBAC 3 : RBAC 0 + RH + Constraints Role Hierarchy (RH) User-Role Assignment (UA)
More informationBPAL: A Platform for Managing Business Process Knowledge Bases via Logic Programming
BPAL: A Platform for Managing Business Process Knowledge Bases via Logic Programming Fabrizio Smith, Dario De Sanctis, Maurizio Proietti National Research Council, IASI Antonio Ruberti - Viale Manzoni
More information6.001 Notes: Section 6.1
6.001 Notes: Section 6.1 Slide 6.1.1 When we first starting talking about Scheme expressions, you may recall we said that (almost) every Scheme expression had three components, a syntax (legal ways of
More informationSemantic Web Systems Ontologies Jacques Fleuriot School of Informatics
Semantic Web Systems Ontologies Jacques Fleuriot School of Informatics 15 th January 2015 In the previous lecture l What is the Semantic Web? Web of machine-readable data l Aims of the Semantic Web Automated
More informationA Top-Down Visual Approach to GUI development
A Top-Down Visual Approach to GUI development ROSANNA CASSINO, GENNY TORTORA, MAURIZIO TUCCI, GIULIANA VITIELLO Dipartimento di Matematica e Informatica Università di Salerno Via Ponte don Melillo 84084
More informationThe TOBIAS test generator and its adaptation to some ASE challenges Position paper for the ASE Irvine Workshop
The test generator and its adaptation to some ASE challenges Position paper for the ASE Irvine Workshop Y. Ledru Laboratoire Logiciels Systèmes Réseaux/IMAG BP 72, F-38402 Saint-Martin-d Hères CEDEX, FRANCE
More informationIntelligent flexible query answering Using Fuzzy Ontologies
International Conference on Control, Engineering & Information Technology (CEIT 14) Proceedings - Copyright IPCO-2014, pp. 262-277 ISSN 2356-5608 Intelligent flexible query answering Using Fuzzy Ontologies
More informationMastro Studio: a system for Ontology-Based Data Management
Mastro Studio: a system for Ontology-Based Data Management Cristina Civili, Marco Console, Domenico Lembo, Lorenzo Lepore, Riccardo Mancini, Antonella Poggi, Marco Ruzzi, Valerio Santarelli, and Domenico
More informationUML Specification and Correction of Object-Oriented Anti-patterns
UML Specification and Correction of Object-Oriented Anti-patterns Maria Teresa Llano and Rob Pooley School of Mathematical and Computer Sciences Heriot-Watt University Edinburgh, United Kingdom {mtl4,rjpooley}@hwacuk
More informationWP3 Technologies and methods for Web applications
WP3 Technologies and methods for Web applications Introduction The primary goal of work package WP3 - Technologies and methods for Web applications - is the definition, design, and implementation of the
More informationTemporal Authorizations Scheme for XML Documents
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2007 Temporal Authorizations Scheme for XML Documents Jing Wu University
More informationA Graph-Based Formalism for Controlling Access to a Digital Library Ontology
A Graph-Based Formalism for Controlling Access to a Digital Library Ontology Subhasis Dasgupta 1 and Aditya Bagchi 2 1 Indian Statistical Institute, 203 B T Road, Kolkata 700108, India.
More informationSemantic Processing of Sensor Event Stream by Using External Knowledge Bases
Semantic Processing of Sensor Event Stream by Using External Knowledge Bases Short Paper Kia Teymourian and Adrian Paschke Freie Universitaet Berlin, Berlin, Germany {kia, paschke}@inf.fu-berlin.de Abstract.
More informationFunction Symbols in Tuple-Generating Dependencies: Expressive Power and Computability
Function Symbols in Tuple-Generating Dependencies: Expressive Power and Computability Georg Gottlob 1,2, Reinhard Pichler 1, and Emanuel Sallinger 2 1 TU Wien and 2 University of Oxford Tuple-generating
More informationEnhancing Datalog with Epistemic Operators to Reason About Systems Knowledge in
Enhancing Datalog with Epistemic Operators to Enhancing ReasonDatalog About Knowledge with Epistemic in Distributed Operators to Reason About Systems Knowledge in Distributed (Extended abstract) Systems
More informationSmartAccess: An Intelligent Proactive Role-Based Authorization System
Department of Computer Science and Engineering University of Texas at Arlington Arlington, TX 76019 SmartAccess: An Intelligent Proactive Role-Based Authorization System Raman Adaikkalavan and Sharma Chakravarthy
More informationPerformance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality
Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality Yogita R. More 1, Dr. S. V. Gumaste 2 PG Scholar, Dept.Of Computer Engineering, GES's R. H. Sapat COE,
More informationMeta Architecting: Towered a New Generation of Architecture Description Languages
Journal of Computer Science 1 (4): 454-460, 2005 ISSN 1549-3636 Science Publications, 2005 Meta Architecting: Towered a New Generation of Architecture Description Languages Adel Smeda, Tahar Khammaci and
More informationAUTHENTICATION AND LOOKUP FOR NETWORK SERVICES
Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,
More informationEvaluating Access Control Policies Through Model Checking
Evaluating Access Control Policies Through Model Checking Nan Zhang, Mark Ryan, and Dimitar P. Guelev School of Computer Science, University of Birmingham, Birmingham UK, B15 2TT nxz,mdr @cs.bham.ac.uk
More informationUnderstandability and Semantic Interoperability of Diverse Rules Systems. Adrian Walker, Reengineering [1]
Understandability and Semantic Interoperability of Diverse Rules Systems Adrian Walker, Reengineering [1] Position Paper for the W3C Workshop on Rule Languages for Interoperability 27-28 April 2005, Washington,
More informationAn Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models
An Equivalent Access Based Approach for Building Collaboration Model between Distinct Access Control Models Xiaofeng Xia To cite this version: Xiaofeng Xia. An Equivalent Access Based Approach for Building
More informationAn Ontological Analysis of Metamodeling Languages
An Ontological Analysis of Metamodeling Languages Erki Eessaar and Rünno Sgirka 2 Department of Informatics, Tallinn University of Technology, Estonia, eessaar@staff.ttu.ee 2 Department of Informatics,
More informationThe A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control
The A-IRBAC 2000 Model: istrative Interoperable Role-Based Access Control Jalal Al-Muhtadi, Apu Kapadia, Roy Campbell, Dennis Mickunas {almuhtad akapadia rhc mickunas}@uiuc.edu Department of Computer Science
More informationChecking General Safety Criteria on UML Statecharts
Checking General Safety Criteria on UML Statecharts Zsigmond Pap, István Majzik 1 and András Pataricza Dept. of Measurement and Information Systems Budapest University of Technology and Economics H-1521
More informationComparing the Expressive Power of Access Control Models
Comparing the Expressive Power of Access Control Models Mahesh V. Tripunitara tripunit@cerias.purdue.edu Ninghui Li ninghui@cs.purdue.edu Center for Education and Research in Information Assurance and
More informationCatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models
CatBAC: A Generic Framework for Designing and Validating Hybrid Access Control Models Bernard Stepien Hemanth Khambhammettu Kamel Adi Luigi Logrippo Department of Computer Science and Engineering, University
More informationMIT Database Management Systems Lesson 01: Introduction
MIT 22033 Database Management Systems Lesson 01: Introduction By S. Sabraz Nawaz Senior Lecturer in MIT, FMC, SEUSL Learning Outcomes At the end of the module the student will be able to: Describe the
More informationA JAVA-BASED SYSTEM FOR XML DATA PROTECTION* E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti
CHAPTER 2 Author- A JAVA-BASED SYSTEM FOR XML DATA PROTECTION* E. Bertino, M. Braun, S. Castano, E. Ferrari, M. Mesiti Abstract Author- is a Java-based system for access control to XML documents. Author-
More informationA model of navigation history
A model of navigation history Connor G. Brewster Alan Jeffrey August, 6 arxiv:68.5v [cs.se] 8 Aug 6 Abstract: Navigation has been a core component of the web since its inception: users and scripts can
More informationOverview of Web Mining Techniques and its Application towards Web
Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous
More informationOperational Semantics 1 / 13
Operational Semantics 1 / 13 Outline What is semantics? Operational Semantics What is semantics? 2 / 13 What is the meaning of a program? Recall: aspects of a language syntax: the structure of its programs
More informationPropositional Logic. Part I
Part I Propositional Logic 1 Classical Logic and the Material Conditional 1.1 Introduction 1.1.1 The first purpose of this chapter is to review classical propositional logic, including semantic tableaux.
More informationLightweight Semantic Web Motivated Reasoning in Prolog
Lightweight Semantic Web Motivated Reasoning in Prolog Salman Elahi, s0459408@sms.ed.ac.uk Supervisor: Dr. Dave Robertson Introduction: As the Semantic Web is, currently, in its developmental phase, different
More informationODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 3 March 2013 Page No. 806-810 ODA : PROCESSING MODEL DESIGN FOR LINKING DOCUMENT R. N. Jugele *, Dr.
More informationSemantic Web Test
Semantic Web Test 24.01.2017 Group 1 No. A B C D 1 X X X 2 X X 3 X X 4 X X 5 X X 6 X X X X 7 X X 8 X X 9 X X X 10 X X X 11 X 12 X X X 13 X X 14 X X 15 X X 16 X X 17 X 18 X X 19 X 20 X X 1. Which statements
More informationX STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL
X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL Que Nguyet Tran Thi Faculty of Computer Science & Technology HCMC University of Technology, VNUHCM Ho Chi
More informationSCHEMA BASED XML SECURITY: RBAC APPROACH
SCHEMA BASED XML SECURITY: RBAC APPROACH Xinwen Zhang, Jaehong Park, and Ravi Sandhu George Mason University {xzhang6, jpark2, sandhu) } @gmu.edu Abstract Security of XML instance is a basic problem, especially
More informationλ-rbac: Programming with Role-Based Access Control
λ-rbac: Programming with Role-Based Access Control Radha Jagadeesan 1,, Alan Jeffrey 2,, Corin Pitcher 1, and James Riely 1, 1 School of CTI, DePaul University 2 Bell Labs, Lucent Technologies Abstract.
More informationAPPLICATION OF A METASYSTEM IN UNIVERSITY INFORMATION SYSTEM DEVELOPMENT
APPLICATION OF A METASYSTEM IN UNIVERSITY INFORMATION SYSTEM DEVELOPMENT Petr Smolík, Tomáš Hruška Department of Computer Science and Engineering, Faculty of Computer Science and Engineering, Brno University
More informationSemantic reasoning for dynamic knowledge bases. Lionel Médini M2IA Knowledge Dynamics 2018
Semantic reasoning for dynamic knowledge bases Lionel Médini M2IA Knowledge Dynamics 2018 1 Outline Summary Logics Semantic Web Languages Reasoning Web-based reasoning techniques Reasoning using SemWeb
More informationX-KIF New Knowledge Modeling Language
Proceedings of I-MEDIA 07 and I-SEMANTICS 07 Graz, Austria, September 5-7, 2007 X-KIF New Knowledge Modeling Language Michal Ševčenko (Czech Technical University in Prague sevcenko@vc.cvut.cz) Abstract:
More informationData Integration: A Theoretical Perspective
Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy lenzerini@dis.uniroma1.it ABSTRACT
More informationMobile and Heterogeneous databases Security. A.R. Hurson Computer Science Missouri Science & Technology
Mobile and Heterogeneous databases Security A.R. Hurson Computer Science Missouri Science & Technology 1 Note, this unit will be covered in two lectures. In case you finish it earlier, then you have the
More informationRole-based administration of user-role assignment: The URA97 model and its Oracle implementation
Journal of Computer Security 7 (1999) 317 342 317 IOS Press Role-based administration of user-role assignment: The URA97 model and its Oracle implementation Ravi Sandhu and Venkata Bhamidipati Laboratory
More informationChapter 1. Introduction
1 Chapter 1 Introduction An exciting development of the 21st century is that the 20th-century vision of mechanized program verification is finally becoming practical, thanks to 30 years of advances in
More informationSpecification of Behavioural Requirements within Compositional Multi-Agent System Design
Specification of Behavioural Requirements within Compositional Multi-Agent System Design Daniela E. Herlea 1, Catholijn M. Jonker 2, Jan Treur 2, Niek J.E. Wijngaards 1,2 1 University of Calgary, Software
More informationDC Proposal: Knowledge Based Access Control Policy Specification and Enforcement
DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement Sabrina Kirrane Digital Enterprise Research Institute National University of Ireland, Galway http://www.deri.ie sabrina.kirrane@deri.org
More informationDatabase Instance And Relational Schema Design A Fact Oriented Approach
Database Instance And Relational Schema Design A Fact Oriented Approach File-oriented approaches create problems for organizations because of d) how master files maintain facts used by certain application
More informationCPSC 427: Object-Oriented Programming
CPSC 427: Object-Oriented Programming Michael J. Fischer Lecture 1 August 29, 2018 CPSC 427, Lecture 1, August 29, 2018 1/30 About This Course Topics to be Covered Kinds of Programming Why C++? C++ Programming
More informationSoftware Design Description
Drogba Inc. Software Design Description Ali Hopyar 1746056 Fatih Hafızoğlu 1746049 Halim Kaya 1746148 Volkan Gümüş 1746007 Table of Contents 1 Overview... 3 1.1 Scope... 3 1.2 Purpose... 3 1.3 Intended
More informationAccess Control. Protects against accidental and malicious threats by
Access Control 1 Access Control Access control: ensures that all direct accesses to object are authorized a scheme for mapping users to allowed actions Protection objects: system resources for which protection
More informationOn Mutually-Exclusive Roles and Separation of Duty
On Mutually-Exclusive Roles and Separation of Duty Ninghui Li ninghui@cs.purdue.edu Ziad Bizri zelbizri@cs.purdue.edu Mahesh V. Tripunitara tripunit@cerias.purdue.edu Center for Education and Research
More informationOrganizing Information. Organizing information is at the heart of information science and is important in many other
Dagobert Soergel College of Library and Information Services University of Maryland College Park, MD 20742 Organizing Information Organizing information is at the heart of information science and is important
More informationTooCoM : a Tool to Operationalize an Ontology with the Conceptual Graphs Model
TooCoM : a Tool to Operationalize an Ontology with the Conceptual Graphs Model Frédéric Fürst, Michel Leclère, Francky Trichet Institut de Recherche en Informatique de Nantes 2 rue de la Houssinière -
More informationQuery Rewriting Using Views in the Presence of Inclusion Dependencies
Query Rewriting Using Views in the Presence of Inclusion Dependencies Qingyuan Bai Jun Hong Michael F. McTear School of Computing and Mathematics, University of Ulster at Jordanstown, Newtownabbey, Co.
More informationTrustworthiness Based Authorization on WWW
CERIAS Tech Report 2002-08 Trustworthiness Based Authorization on WWW Y. Zong, B. Bhargava, M. Mahoui Center for Education and Research in Information Assurance and Security & Department of Computer Science,
More informationContext-Sensitive Data Security for Business Applications Performance Optimization
Context-Sensitive Data Security for Business Applications Performance Optimization Arjun K Sirohi Oracle USA Inc, Bellevue, WA, USA Arjun.Sirohi@oracle.com Abstract the importance of data security in enterprise
More informationInconsistency-tolerant logics
Inconsistency-tolerant logics CS 157 Computational Logic Autumn 2010 Inconsistent logical theories T 1 = { p(a), p(a) } T 2 = { x(p(x) q(x)), p(a), q(a) } Definition: A theory T is inconsistent if T has
More information