2002 Journal of Software

Size: px
Start display at page:

Download "2002 Journal of Software"

Transcription

1 /2002/13(01) Journal of Software Vol13, No1,, (,100871) http//wwwpkueducn,,,,, ; ; ; TP311 A, (component-based software development, CBSD) CBSD,,,, [1], CBSD,, (Jade Bird Web component library system, JBWCL),, JBWCL 1 JBWCL 2 3 JBWCL JBWCL, III, CBSD JBCL /,,CBSD,,,,, JBCL, [2] ; (96-729); 863 ( ) (1973),,,, ; (1946),,,,,,, ;(1970),,,,,,CSCW

2 93 Internet World Wide Web, Internet,JBCL JBWCLJBWCL,, 12 JBWCL 3,JBWCL,,,,,,,,,,,,,,,,,,, Web, JBWCL, 2 (discretionary access control, DAC) (mandatory access control, MAC)DAC,,, JBWCL,MAC,,, [3] MAC,, JBWCL (role-based access control, RBAC),,, [4~6] RBAC DAC MAC, DAC,RBAC, MAC,RBAC, [7] RBAC, 1, ;, ;,, [5] RBAC,, ( ), [4] ( ), RBAC,,,

3 94 Journal of Software 2002,13(1) ( 3 4), ( 1 2), 2,RBAC, ( ) User m n Role m n Privilege Fig1,, Relation among user, role and privilege 1 Privilege 1 Privilege 2 Privilege 3 Privilege 4 Senior manager General clerk Inheritance (containment) Member 1 Member 2 Member 3 Member 4 Member 5 RBAC,,, ( ) Fig2 Role inheritance 2 (1), (2),, (2a) (static separation of duty constraint, SSD), ; (2b) (dynamic separation of duty constraint, DSD),, (3) [4,8] 3 JBWCL,, ( ),,, ( ) ( ) ;,,, JBWCL RBAC (role-based component library access control, RBCLAC)

4 95 (users)jbwcl,cbsd, (roles)jbwcl, /, (privileges),, ;,, JBWCL 1,, (role inheritsrolesroles), - (rolesprivileges), ;, - (usersroles) JBCWL,, ; (SSDrolesroles) SSD,,, (DSDrolesroles) DSD,,,, (cardinality)cardinality(r) r,,, [4,9~12] 32,,,,, JBWCL, ;, JBWCL 3,,,, SSD, SSDProvidervalidator, 1,, Cardinality(SuperManager)=1

5 96 Journal of Software 2002,13(1),, Facet manager System cumstomizer AccessControl manager UserInfo manager Validator Component manager Provider SuperManager,,,,,,, Fig3 Role inheritance in component library system 3 33,,,,,,,,,,,,,, ;,,,,,,,,,,

6 97,,,,,,, 4 JBWCL,,,,, RBAC JBWCL RBAC 3, JBWCL,, JBWCL, JBWCL,; RBAC, References [1] Brown, AW, Wallnau, KC Engineering of component-based systems In Component-Based Software Engineering Selected Papers from the Software Engineering Institute Los Alamitos, CA IEEE Computer Society Press, ~15 [2] Li, Ke-qin, Guo, Li-feng, Mei, Hong, et al An overview of JB (Jade Bird) component library system JBCL In Chen, Jian, Li, Ming-shu, Mingins, C, et al, eds Proceedings of the 24th International Conference TOOLS Asia Los Alamitors, CA IEEE Computer Society Press, ~267 [3] DOD (US Dept of Defense) Trusted Computing System Evaluation Criteria DOD 5200, 28-STD, 1985 http//wwwfasorg/irp/ nsa/rainbow/std001htm [4] Ferraiolo, DF, Kuhn, RD Role-Based access control In Proceedings of the 15th NIST-NSA National Computer Security Conference Baltimore, MD ACM Press, ~16 http//wwwitlnistgov/div893/projects/ accesshtml [5] Ferraiolo, DF, Cugini, JA, Kuhn, RD Role based access control features and motivations In Proceedings of the 11th Annual Computer Security Applications Conference Los Alamitors, CA IEEE Computer Society Press, ~31 [6] Sandhu, R, Coyne, E, Feinstein, H, et al Role-Based access control models IEEE Computer, 1996,29(2)38~47 [7] Barkley, J Comparing simple role based access control models and access control lists In Proceedings of the 2nd ACM Workshop on Role Based Access Control Fairfax, Virginia ACM Press, ~132 http//devacmorg/pubs/citations/proceedings/ commsec/266741/p127-barkley/ [8] Mohammed, I, Dilts, DM Design for dynamic user-role-based security Computers and Security, 1994,13(8)661~671 [9] Gavrila, SI, Barkley, JF Formal specification for role based access control user/role and role/role relationship management In Proceedings of the 3rd ACM Workshop on Role-Based Access Control Gavrila, Barkley ACM Press, ~90 [10] Ferraiolo, DF, Barkley, J, Kuhn, RD A role based access control odel and reference implementation within a corporate Intranet ACM Transactions on Information Systems Security, 1999,1(2)34~64 [11] Luihi Giuri Role-Based access control for the Web using Java In Proceedings of the 4th ACM Workshop on Role Based Access Control Fairfax, Virginia ACM Press, ~18 [12] Kuhn, RD Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems In Proceedings of the 2nd ACM Workshop on Role Based Access Control Fairfax, Virginia ACM Press, ~30

7 98 Journal of Software 2002,13(1) Access Control in Jade Bird Web Component Library System ZOU Wei, SUN Jia-su, SUN Yan-chun (Department of Computer Science and Technology, Beijing University, Beijing , China) http//wwwpkueducn Abstract Jade Bird web component library system (JBWCL) can support the management of software components, thereby facilitating component-based software development in software enterprises However, the system brings the problem of security and copyright, at the same time it improves openness To solve these problems, the role-based access control is employed in JBWCL, and the component entity is separated from its description in this paper The user, role, phrivilege and role hierarchy for the system and those components stored in it are defined The mechanism meets the requirement of security and copyright, meanwhile ensure the efficiency of the system and the support to reuse Key words software reuse; component-based software development; component library system; access control; role-based access control Received March 23, 2000; accepted July 18, 2000 Supported by the Key Sci-Tech Project of the National Ninth Five-Year-Plan of China under Grant No96-729; the National High Technology Development 863 Program of China under Grant No ,,,,,, 1,,,, 2,,,,,,, 3,, ( ),, 4,, ( ), 5, (, ),, 6,,,,,, 7,,,, 8,,,,

Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management

Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management Serban I. Gavrila VDG Inc. 6009 Brookside Drive Chevy Chase, MD 20815 gavrila@csmes.ncsl.nist.gov John

More information

Role-Evolution in Role-based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University, Puducherry, India

Role-Evolution in Role-based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University, Puducherry, India International Journal of Emerging Research in Management &Technology Research Article July 2017 -Evolution in -based Access Control System Suganthy. A * Department of Banking Technology Pondicherry University,

More information

An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model

An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 22, 49-61 (2006) An Approach to XML-Based Administration and Secure Information Flow Analysis on an Object Oriented Role-Based Access Control Model CUNGANG

More information

CS590U Access Control: Theory and Practice. Lecture 12 (February 23) Role Based Access Control

CS590U Access Control: Theory and Practice. Lecture 12 (February 23) Role Based Access Control CS590U Access Control: Theory and Practice Lecture 12 (February 23) Role Based Access Control Role-Based Access Control Models. R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. IEEE Computer,

More information

Information Security CS 526

Information Security CS 526 Information Security CS 526 Topic 23: Role Based Access Control CS526 Topic 23: RBAC 1 Readings for This Lecture RBAC96 Family R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-Based Access

More information

Context-Sensitive Data Security for Business Applications Performance Optimization

Context-Sensitive Data Security for Business Applications Performance Optimization Context-Sensitive Data Security for Business Applications Performance Optimization Arjun K Sirohi Oracle USA Inc, Bellevue, WA, USA Arjun.Sirohi@oracle.com Abstract the importance of data security in enterprise

More information

An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC

An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC An Object-Dependent and Context Constraints-Aware Access Control Approach Based on RBAC Xiaoli Ren, Lu Liu and Chenggong Lv School of Economics & Management, Beihang University, Beijing 100083, P.R. China

More information

Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences

Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences xorbac Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences Mark Strembeck Department of Information Systems, New Media Lab Vienna University of Economics and BA, Austria

More information

Data Security and Privacy. Topic 8: Role Based Access Control

Data Security and Privacy. Topic 8: Role Based Access Control Data Security and Privacy Topic 8: Role Based Access Control Plan for this lecture CodeShield: towards personalized application whitelisting. Christopher S. Gates, Ninghui Li, Jing Chen, Robert W. Proctor:

More information

Time-constraint Access Control in Pervasive Computing Environments

Time-constraint Access Control in Pervasive Computing Environments Time-constraint Access Control in Pervasive Computing Environments Jun-qing Li lijunqing@lcu.edu.cn Quan-ke Pan panquanke@lcu.edu.cn Sheng-xian Xie xsx@lcu.edu.cn Yu-ting Wang wangyuting@lcu.edu.cn ABSTRACT

More information

A Fresh Look at Small-Granularity Role-Based Access Control

A Fresh Look at Small-Granularity Role-Based Access Control Association for Information Systems AIS Electronic Library (AISeL) ACIS 2001 Proceedings Australasian (ACIS) 2001 A Fresh Look at Small-Granularity Role-Based Access Control A.B Ruighaver University of

More information

General Access Control Model for DAC

General Access Control Model for DAC General Access Control Model for DAC Also includes a set of rules to modify access control matrix Owner access right Control access right The concept of a copy flag (*) Access control system commands General

More information

CS 356 Lecture 7 Access Control. Spring 2013

CS 356 Lecture 7 Access Control. Spring 2013 CS 356 Lecture 7 Access Control Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,

More information

RB-GACA: A RBAC based Grid Access Control Architecture

RB-GACA: A RBAC based Grid Access Control Architecture RB-GACA: A RBAC based Grid Access Control Architecture Weizhong Qiang, Hai Jin, Xuanhua Shi, Deqing Zou, Hao Zhang Cluster and Grid Computing Lab Huazhong University of Science and Technology, Wuhan, 430074,

More information

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Sigrid Schefer 1, Mark Strembeck 1, Jan Mendling 2, and Anne Baumgrass 1 1 Institute for Information

More information

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations

Separation of Duty in Role-Based Access Control Model through Fuzzy Relations Third International Symposium on Information Assurance and Security Separation of Duty in Role-Based Access Control Model through Fuzzy Relations Hassan Takabi Morteza Amini Rasool Jalili Network Security

More information

Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality

Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality Performance Evaluation of A Role Based Access Control Constraints in Role Mining Using Cardinality Yogita R. More 1, Dr. S. V. Gumaste 2 PG Scholar, Dept.Of Computer Engineering, GES's R. H. Sapat COE,

More information

Core Role Based Access Control (RBAC) mechanism for MySQL

Core Role Based Access Control (RBAC) mechanism for MySQL Core Role Based Access Control (RBAC) mechanism for MySQL by Ian Molloy Radu Dondera Umang Sharan CS541 Project Report Under the Guidance of Prof. Elisa Bertino With the Department of Computer Science

More information

Temporal Hierarchy and Inheritance Semantics for GTRBAC

Temporal Hierarchy and Inheritance Semantics for GTRBAC CERIAS Tech Report 2001-52 Temporal Hierarchy and Inheritance Semantics for GTRBAC James B. D. Joshi 1, Elisa Bertino 2, Arif Ghafoor 1 Center for Education and Research in Information Assurance and Security

More information

2002 Journal of Software

2002 Journal of Software 1000-9825/2002/13(09)1846-06 2002 Journal of Software Vol13, No9,,, (,100080) E-mail: lijie@ieliscasaccn http://ieliscasaccn :,,,,, : ; ; ; ; ; : TP391 : A Takeo Igarashi 3D Teddy [1] Teddy, 3D Teddy Teddy,

More information

A Context-sensitive Access Control Model and Prototype Implementation

A Context-sensitive Access Control Model and Prototype Implementation A Context-sensitive Access Control Model and Prototype Implementation Damian G. Cholewka 1, Reinhardt A. Botha 2, Jan H.P. Eloff 1 1 Rand Afrikaans University, Johannesburg, South Africa 2 Port Elizabeth

More information

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model James B. D. Joshi #, Elisa Bertino *, Arif Ghafoor # Center for Education and Research in Information Assurance and Security

More information

Attribute-Based Access and Communication Control Models for Cloud and Cloud-Enabled Internet of Things

Attribute-Based Access and Communication Control Models for Cloud and Cloud-Enabled Internet of Things Attribute-Based Access and Communication Control Models for Cloud and Cloud-Enabled Internet of Things Ph.D. Dissertation Defense: Smriti Bhatt Institute for Cyber Security (ICS) Department of Computer

More information

Efficient Role Based Access Control Method in Wireless Environment

Efficient Role Based Access Control Method in Wireless Environment Efficient Role Based Access Control Method in Wireless Environment Song-hwa Chae 1, Wonil Kim 2, and Dong-kyoo Kim 3* 1 1 Graduate School of Information and Communication, Ajou University, Suwon, Korea

More information

CONUGA: Constrained User-Group Assignment

CONUGA: Constrained User-Group Assignment Journal of Network and Computer Applications (2001) 24, 87 100 doi:10.1006/jnca.2000.0125, available online at http://www.idealibrary.com on CONUGA: Constrained User-Group Assignment Gail-Joon Ahn Ł and

More information

Role-Based Authorization Constraints Specification

Role-Based Authorization Constraints Specification Role-Based Authorization Constraints Specification GAIL-JOON AHN University of North Carolina at Charlotte and RAVI SANDHU George Mason University Constraints are an important aspect of role-based access

More information

Supporting Relationships in Access Control Using Role Based Access Control

Supporting Relationships in Access Control Using Role Based Access Control Supporting Relationships in Access Control Using Role Based Access Control John Barkley National Institute of Standards and Technology jbarkley@nist.gov Konstantin Beznosov Baptist Health Systems of South

More information

Role-Based Access Control (RBAC): Features and Motivations

Role-Based Access Control (RBAC): Features and Motivations Role-Based Access Control (RBAC): Features and Motivations David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn National Institute of Standards and Technology U. S. Department of Commerce Gaithersburg

More information

Resource and Role Based Access Control Model. Xingdong Li, Zhengping Jin

Resource and Role Based Access Control Model. Xingdong Li, Zhengping Jin 3rd International Conference on Mechatronics and Industrial Informatics (ICMII 2015) Resource and Role Based Access Control Model Xingdong Li, Zhengping Jin State Key Laboratory of Networking and Switching

More information

Director (DIR) Engineer 1 (E1) Engineer 2 (E2) Project 1 Project 2 Engineering Department (ED) Employee (E) Senior Security Officer (SSO)

Director (DIR) Engineer 1 (E1) Engineer 2 (E2) Project 1 Project 2 Engineering Department (ED) Employee (E) Senior Security Officer (SSO) Proceedings of 3rd ACM Workshop on Role-Based Access Control, Fairfax, Virginia, October 22-23, 1998 Decentralized User-Role Assignment for Web-based Intranets Ravi Sandhu and Joon S. Park Laboratory for

More information

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96

Advanced Access Control. Role-Based Access Control. Common Concepts. General RBAC Rules RBAC96 Advanced Access Control In many cases, identity is a bad criteria for authorization. We examine two modern paradigms for access control, which overcome this limitation: 1. Role-Based Access Control 2.

More information

Overview. Evolution of Access Control in Commercial Products. Access Control is Different from other Mechanisms. Security Policies

Overview. Evolution of Access Control in Commercial Products. Access Control is Different from other Mechanisms. Security Policies Overview Evolution of Access Control in Commercial Products Policies, Models and Techniques David Ferraiolo National Institute of Standards and Technology 301-975-3046 dferraiolo@nist.gov Practical View

More information

Applying the Semantic Web Layers to Access Control

Applying the Semantic Web Layers to Access Control J. Lopez, A. Mana, J. maria troya, and M. Yague, Applying the Semantic Web Layers to Access Control, IEEE International Workshop on Web Semantics (WebS03), pp. 622-626, 2003. NICS Lab. Publications: https://www.nics.uma.es/publications

More information

A Modal Logic for Role-Based Access Control

A Modal Logic for Role-Based Access Control A Modal Logic for Role-Based Access Control Thumrongsak Kosiyatrakul, Susan Older, and Shiu-Kai Chin EECS Department, Syracuse University, Syracuse, New York 13244, USA skchin@syr.edu Abstract. Making

More information

Introduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations,

Introduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations, Preface p. xv Acknowledgments p. xvii Introduction p. 1 The purpose and fundamentals of access control p. 2 Authorization versus authentication p. 3 Users, subjects, objects, operations, and permissions

More information

Secure Role-Based Workflow Models

Secure Role-Based Workflow Models Secure Role-Based Workflow Models Savith Kandala and Ravi Sandhu Savith Kandala Ravi Sandhu CygnaCom Solutions. SingleSignOn.Net and George Mason University (An Entrust Technologies Company) Dept. of Information

More information

Authentication and Authorization User Management within a Collaborative Community

Authentication and Authorization User Management within a Collaborative Community Proceedings of the 11th WSEAS International Conference on COMPUTERS, Agios Nikolaos, Crete Island, Greece, July 26-28, 2007 565 Authentication and Authorization User Management within a Collaborative Community

More information

The R BAC96 RBAC96 M odel Model Prof. Ravi Sandhu

The R BAC96 RBAC96 M odel Model Prof. Ravi Sandhu The RBAC96 Model Prof. Ravi Sandhu WHAT IS RBAC? multidimensional open ended ranges from simple to sophisticated 2 WHAT IS THE POLICY IN RBAC? LBAC is policy driven: one-directional information flow in

More information

Chapter 4: Access Control

Chapter 4: Access Control (DAC) Chapter 4: Comp Sci 3600 Security Outline (DAC) 1 2 (DAC) 3 4 5 Attribute-based control (DAC) The prevention of unauthorized use of a resource, including the prevention of use of a resource in an

More information

Access Control (slides based Ch. 4 Gollmann)

Access Control (slides based Ch. 4 Gollmann) Access Control (slides based Ch. 4 Gollmann) Preliminary Remarks Computer systems and their use have changed over the last three decades. Traditional multi-user systems provide generic services to their

More information

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context

Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Detecting and Resolving Conflicts of Mutual-Exclusion and Binding Constraints in a Business Process Context Sigrid Schefer 1, Mark Strembeck 1, Jan Mendling 2, and Anne Baumgrass 1 1 Institute for Information

More information

The Role Control Center: Features and Case Studies

The Role Control Center: Features and Case Studies The Role Control Center: Features and Case Studies David F. Ferraiolo NIST 820 West Diamond Dr. Gail-Joon Ahn Univ. of NC at Charlotte 9801 University City Blvd. R.Chandramouli NIST 820 West Diamond Dr.

More information

Constraint Access Control for Direct Authorization

Constraint Access Control for Direct Authorization Constraint Access Control for Direct Authorization Wei-Li Han, Xing-Dong Shi, Yin-Sheng Li School of Software, Fudan Universiq, Shanghai, 200433, I? R. China wlhanmdun. edu. cn, 0420530/5@dan. edu. cn,

More information

2. Methodology. 1. Introduction. Tie-RBAC: An application of RBAC to Social Networks. 2.1 Social Network Analysis

2. Methodology. 1. Introduction. Tie-RBAC: An application of RBAC to Social Networks. 2.1 Social Network Analysis Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access

More information

2002 Journal of Software

2002 Journal of Software 0-9825/2002/13(01)0051-08 2002 Journal of Software Vol13, No1,, (,0) E-mail qiaoyingbj@hotmailcom http//ieliscasaccn,,,,,,, ; ; ; TP301 A,,,,,Mok [1],,, Krithi Ramamritham [2],,,,GManimaran [3] Anita Mittal

More information

Access Control for Shared Resources

Access Control for Shared Resources Access Control for Shared Resources Erik Wilde and Nick Nabholz Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology (ETH Zürich) Abstract Access control for shared

More information

Integrating Attributes into Role-Based Access Control

Integrating Attributes into Role-Based Access Control Integrating Attributes into Role-Based Access Control Qasim Rajpoot, Christian Jensen, Ram Krishnan To cite this version: Qasim Rajpoot, Christian Jensen, Ram Krishnan. Integrating Attributes into Role-Based

More information

A Closer Look to the V-Model Approach for Role Engineering

A Closer Look to the V-Model Approach for Role Engineering A Closer Look to the V-Model Approach for Role Engineering RADU CONSTANTINESCU, ANDREI TOMA The Economic Informatics Department Academy of Economic Studies Bucharest, Piata Romana n o 62 ROMANIA radu.constantinescu@ie.ase.ro,

More information

A Knowledge-Based Approach to Internet Authorization Using PKI

A Knowledge-Based Approach to Internet Authorization Using PKI A Knowledge-Based Approach to Internet Authorization Using PKI Along Lin Trusted E-Services Laboratory HP Laboratories Bristol HPL-2000-133 October 13 th, 2000* E-mail: alin@h plb.h pl.h p.com policy-driven

More information

RBAC: Motivations. Users: Permissions:

RBAC: Motivations. Users: Permissions: Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,

More information

Access Control. Discretionary Access Control

Access Control. Discretionary Access Control Access Control Discretionary Access Control 1 Access Control Access control is where security engineering meets computer science. Its function is to control which (active) subject have access to a which

More information

USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS

USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS Indrakshi Ray, Na Li, Dae-Kyoo Kim, Robert France Department of Computer Science Colorado State University iray, na, dkkim, france @cs.colostate.edu

More information

An Adaptive e-service for Bridging the Cloud Services by an Optimal Selection Approach

An Adaptive e-service for Bridging the Cloud Services by an Optimal Selection Approach 2122 An Adaptive e-service for Bridging the Cloud Services by an Optimal Selection Approach Chih-Kun Ke National Taichung University of Science and Technology, Dept. of Information Management, Taichung,

More information

UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept

UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept UML Representation of Extended Role-Based Access Control Model with the Use of Usage Control Concept Aneta Poniszewska-Maranda Institute of Information Technology, Technical University of Lodz, Poland

More information

Extended RBAC With Blob Storage On Cloud

Extended RBAC With Blob Storage On Cloud Extended RBAC With Blob Storage On Cloud Mamoon Rashid Research Scholar Department Of Computer Science Engineering Ramgharia Institute of Engineering and Technology Phagwara, Punjab, India. Email: mamoon873@gmail.com.

More information

Discretionary and Mandatory Controls for Role-Based Administration

Discretionary and Mandatory Controls for Role-Based Administration Discretionary and Mandatory Controls for Role-Based Administration Jason Crampton Information Security Group, Royal Holloway, University of London jason.crampton@rhul.ac.uk Abstract. Role-based access

More information

Access control models and policies

Access control models and policies Access control models and policies Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 1. Access control 2. Discretionary AC 3. Mandatory AC 4. Other AC models Outline

More information

Reliability of separation of duty in ANSI standard role-based access control

Reliability of separation of duty in ANSI standard role-based access control Scientia Iranica D (2011) 18 (6), 1416 1424 Sharif University of Technology Scientia Iranica Transactions D: Computer Science & Engineering and Electrical Engineering www.sciencedirect.com Reliability

More information

Enhanced Sharing and Privacy in Distributed Information Sharing Environments

Enhanced Sharing and Privacy in Distributed Information Sharing Environments Enhanced Sharing and Privacy in Distributed Information Sharing Environments Ahmad Kamran Malik, Schahram Dustdar Distributed Systems Group, Vienna University of Technology, Austria {kamran, dustdar}@infosys.tuwien.ac.at

More information

Visualizing Access Control Policies in Databases. Jared Chandler. Comp 116 Fall 2015

Visualizing Access Control Policies in Databases. Jared Chandler. Comp 116 Fall 2015 Visualizing Access Control Policies in Databases Jared Chandler Comp 116 Fall 2015 To the Community I chose this topic because it is something I have an interest in improving. SQL databases are widespread

More information

INHERITANCE PROPERTIES OF ROLE HIERARCHIES. W.A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA

INHERITANCE PROPERTIES OF ROLE HIERARCHIES. W.A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA INHERITANCE PROPERTIES OF ROLE HIERARCHIES W.A. Jansen National Institute of Standards and Technology Gaithersburg, MD 20899, USA wjansen@nist.gov Abstract: Role Based Access Control (RBAC) refers to a

More information

Access Control Models Part II

Access Control Models Part II Access Control Models Part II CERIAS and CS &ECE Departments Pag. 1 Introduction Other models: The Chinese Wall Model it combines elements of DAC and MAC RBAC Model it is a DAC model; however, it is sometimes

More information

Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model

Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model International Journal of Computer and Communication Engineering, Vol. 3, No. 3, May 2014 Supporting Authorization Reasoning Based on Role and Resource Hierarchies in an Ontology-Enriched XACML Model Ha

More information

Analysis of Various RBAC and ABAC Based Access Control Models with Their Extension

Analysis of Various RBAC and ABAC Based Access Control Models with Their Extension Analysis of Various RBAC and ABAC Based Access Control Models with Their Extension Prajapati Barkha, Gurucharansingh Sahani Student, Assistant Professor, Computer Engineering Department, Sardar Vallabhbhai

More information

Computer Security 3e. Dieter Gollmann. Chapter 5: 1

Computer Security 3e. Dieter Gollmann.  Chapter 5: 1 Computer Security 3e Dieter Gollmann www.wiley.com/college/gollmann Chapter 5: 1 Chapter 5: Access Control Chapter 5: 2 Introduction Access control: who is allowed to do what? Traditionally, who is a person.

More information

A Technique for Design Patterns Detection

A Technique for Design Patterns Detection A Technique for Design Patterns Detection Manjari Gupta Department of computer science Institute of Science Banaras Hindu University Varansi-221005, India manjari_gupta@rediffmail.com Abstract Several

More information

Post-Class Quiz: Access Control Domain

Post-Class Quiz: Access Control Domain 1. In order to perform data classification process, what must be present? A. A data classification policy. B. A data classification standard. C. A data classification procedure. D. All of the above. 2.

More information

Fuzzy Role-Based Access Control

Fuzzy Role-Based Access Control This is the author's version of a work that was accepted for publication in Information processing letters (Elsevier). Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

Policy Storage for Role-Based Access Control Systems

Policy Storage for Role-Based Access Control Systems Policy Storage for Role-Based Access Control Systems András Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge, United Kingdom

More information

The security solution for Windows XP end of life with trusted computing technology

The security solution for Windows XP end of life with trusted computing technology Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) The security solution for Windows XP end of life with trusted computing technology Cui Zhanhua1, a *, Pan Hongyi2

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL

X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL X STROWL: A Generalized Extension of XACML for Context-aware Spatio-Temporal RBAC Model with OWL Que Nguyet Tran Thi Faculty of Computer Science & Technology HCMC University of Technology, VNUHCM Ho Chi

More information

An Approach to Manage and Search for Software Components *

An Approach to Manage and Search for Software Components * An Approach to Manage and Search for Software Components * 1 College of Information Engineering, Shenzhen University, Shenzhen, 518060, P.R.China Hao Chen 1, Zhong Ming 1, Shi Ying 2 2 State Key Lab. of

More information

Application of Object Oriented Metrics to Java and C Sharp: Comparative Study

Application of Object Oriented Metrics to Java and C Sharp: Comparative Study International Journal of Computer Applications (9 888) Volume 64 No., February Application of Object Oriented Metrics to Java and C Sharp: Comparative Study Arti Chhikara Maharaja Agrasen College,Delhi,India

More information

Group-Centric Models for Secure and Agile Information Sharing

Group-Centric Models for Secure and Agile Information Sharing Institute for Cyber Security Group-Centric Models for Secure and Agile Information Sharing Ravi Sandhu Executive Director and Endowed Professor October 2010 ravi.sandhu@utsa.edu, www.profsandhu.com, www.ics.utsa.edu

More information

Design and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus

Design and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus Advanced Materials Research Online: 2014-04-09 ISSN: 1662-8985, Vols. 912-914, pp 1213-1217 doi:10.4028/www.scientific.net/amr.912-914.1213 2014 Trans Tech Publications, Switzerland Design and Implementation

More information

Meta-Policies for Distributed Role-Based Access Control Systems

Meta-Policies for Distributed Role-Based Access Control Systems Meta-Policies for Distributed Role-Based Access Control Systems András Belokosztolszki and Ken Moody University of Cambridge Computer Laboratory JJ Thomson Avenue, Cambridge, United Kingdom andras.belokosztolszki,

More information

CSC 474/574 Information Systems Security

CSC 474/574 Information Systems Security CSC 474/574 Information Systems Security Topic 4.4 Role-Based Access Control (RBAC) 1 OUTLINE Role-based Access Control Motivation Features Models Issues 2 1 OWNER-BASED DAC owner has all-or-nothing power

More information

A Service-Centric Approach to a Parameterized RBAC Service

A Service-Centric Approach to a Parameterized RBAC Service A Service-Centric Approach to a Parameterized RBAC Service JONATHAN KEIRRE ADAMS Graduate School of Computer and Information Sciences Nova Southeastern University 3301 College Avenue, Ft. Lauderdale, FL

More information

Information Security & Privacy

Information Security & Privacy IS 2150 / TEL 2810 Information Security & Privacy James Joshi Associate Professor, SIS Hybrid Models Role based Access Control Feb 3, 2016 1 Objective Define/Understand various Integrity models Clark-Wilson

More information

T-RBAC based Multi-domain Access Control Method in Cloud

T-RBAC based Multi-domain Access Control Method in Cloud T-RBAC based Multi-domain Access Control Method in Cloud Dapeng Xiong, Liang Chen Academy of Equipment,Beijing 101416,China E-mail: xiongdapeng@outlook.com, 252958524@qq.com Received: November 6, 2016

More information

An Image Based 3D Reconstruction System for Large Indoor Scenes

An Image Based 3D Reconstruction System for Large Indoor Scenes 36 5 Vol. 36, No. 5 2010 5 ACTA AUTOMATICA SINICA May, 2010 1 1 2 1,,,..,,,,. : 1), ; 2), ; 3),.,,. DOI,,, 10.3724/SP.J.1004.2010.00625 An Image Based 3D Reconstruction System for Large Indoor Scenes ZHANG

More information

A New RBAC Based Access Control Model for Cloud Computing

A New RBAC Based Access Control Model for Cloud Computing A New RBAC Based Access Control Model for Cloud Computing Zhuo ang 1, Juan Wei 1, Ahmed Sallam 1, Kenli Li 1, and Ruixuan Li 2 1 College of Information Science and Engineering, Hunan University, Changsha

More information

Towards Modal Logic Formalization of Role-Based Access Control with Object Classes

Towards Modal Logic Formalization of Role-Based Access Control with Object Classes Towards Modal Logic Formalization of Role-Based Access Control with Object Classes Junghwa Chae École Polytechnique de Montréal Montréal, Québec, Canada chae@cse.concordia.ca Abstract. This paper addresses

More information

An Indian Journal FULL PAPER. Trade Science Inc.

An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12612-12619] Research and implementation of user rights management

More information

Design, Analysis and Processing of Efficient RISC Processor

Design, Analysis and Processing of Efficient RISC Processor Design, Analysis and Processing of Efficient RISC Processor Ramareddy 1, M.N.Pradeep 2 1M-Tech., VLSI D& Embedded Systems, Dept of E&CE, Dayananda Sagar College of Engineering, Bangalore. Karnataka, India

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

A Role-Based Approach to. Restricting Application Execution

A Role-Based Approach to. Restricting Application Execution A Role-Based Approach to Restricting Application Execution Zeon Cliffe Schreuders Supervisors: Christian Payne and Peter Cole This thesis is presented as part of the requirement for the Degree of Bachelor

More information

MURDOCH RESEARCH REPOSITORY

MURDOCH RESEARCH REPOSITORY MURDOCH RESEARCH REPOSITORY http://researchrepository.murdoch.edu.au/ Schreuders, Z.C. and Payne, C. (2008) Functionality-based application confinement: parameterised hierarchical application restrictions.

More information

Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model

Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model Using Graph Theory to Represent a Spatio-Temporal Role-Based Access Control Model MANACHAI TOAHCHOODEE Colorado State University INDRAKSHI RAY Colorado State University and ROSS M. MCCONNELL Colorado State

More information

A Framework for Enforcing Constrained RBAC Policies

A Framework for Enforcing Constrained RBAC Policies A Framework for Enforcing Constrained RBAC Policies Jason Crampton Information Security Group Royal Holloway, University of London jason.crampton@rhul.ac.uk Hemanth Khambhammettu Information Security Group

More information

Integrity Constraints For Access Control Models

Integrity Constraints For Access Control Models 1 / 19 Integrity Constraints For Access Control Models Romuald THION, Stéphane COULONDRE November 27 2008 2 / 19 Outline 1 Introduction 2 3 4 5 3 / 19 Problem statement From Role-BAC to time (Generalized-Temporal-RBAC,

More information

Complexity Reduced Mode Selection of H.264/AVC Intra Coding

Complexity Reduced Mode Selection of H.264/AVC Intra Coding Complexity Reduced Mode Selection of H.264/AVC Intra Coding Mohammed Golam Sarwer 1,2, Lai-Man Po 1, Jonathan Wu 2 1 Department of Electronic Engineering City University of Hong Kong Kowloon, Hong Kong

More information

Fault propagation in tabular expression-based specifications

Fault propagation in tabular expression-based specifications Title Fault propagation in tabular expression-based specifications Authors) Feng, X; Parnas, DL; Tse, TH Citation The 32nd Annual IEEE International Computer Software and Applications Conference COMPSAC

More information

Introduction to Security

Introduction to Security IS 2150 / TEL 2810 Introduction to Security James Joshi Associate Professor, SIS Lecture 6 October 6, 2009 Hybrid Models Role based Access Control 1 Objective Define/Understand various Integrity models

More information

Interaction Partnering Criteria for COTS Components

Interaction Partnering Criteria for COTS Components Interaction Partnering Criteria for COTS Components M. Kelkar M. Smith R. Gamble Department of Mathematical and Computer Sciences University of Tulsa Tulsa, OK 74104 USA gamble@utulsa.edu Abstract Commercial-off-the-Shelf

More information

A Novel Role-based Access Control Model in Cloud Environments

A Novel Role-based Access Control Model in Cloud Environments International Journal of Computational Intelligence Systems, Vol. 9, No. 1 (216) 1-9 A Novel Role-based Access Control Model in Cloud Environments Jun Luo 1, Hongjun Wang 2, Xun Gong 3, Tianrui Li 4 1

More information

Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models

Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models Dissertation Defense: Tahmina Ahmed Dissertation Committee: Dr. Ravi Sandhu, Supervising Professor

More information

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria

Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Introduce the major evaluation criteria. TCSEC (Orange book) ITSEC Common Criteria Evaluation: assessing whether a product has the security properties claimed for it. Certification: assessing whether a

More information

ACTIVE SECURITY ISSUES IN HEALTHCARE INFORMATION SYSTEMS. Christos K. Georgiadis, Ioannis Mavridis and George Pangalos

ACTIVE SECURITY ISSUES IN HEALTHCARE INFORMATION SYSTEMS. Christos K. Georgiadis, Ioannis Mavridis and George Pangalos ACTIVE SECURITY ISSUES IN HEALTHCARE INFORMATION SYSTEMS Christos K. Georgiadis, Ioannis Mavridis and George Pangalos Informatics Lab., Computers Div., Faculty of Technology Aristotle University of Thessaloniki

More information