Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








146 Hits in 3.0 sec

Towards Session-Aware RBAC Administration and Enforcement with XACML

Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray
2009 2009 IEEE International Symposium on Policies for Distributed Systems and Networks  
Towards solving this concurrency problem, we propose a session-aware administrative model for RBAC.  ...  In order to do so, we develop an XACML-ARBAC profile to specify ARBAC policies, and enforce these polices by building an ARBAC enforcement module and a session administrative module.  ...  Towards solving these two problems, we propose a sessionaware administrative model for RBAC.  ... 
doi:10.1109/policy.2009.27 dblp:conf/policy/XuWZC09 fatcat:u3st2w5vyvglhfegp3uasfy2te

Mobile Security with Location-Aware Role-Based Access Control [chapter]

Nils Ulltveit-Moe, Vladimir Oleshchuk
2012 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
It furthermore sketches how spatial separation of duty constraints (both static and dynamic) can be implemented using GeoXACML on top of the XACML RBAC profile.  ...  Location-aware RBAC can be used to implement location dependent access control and also other security enhancing solutions on mobile devices, like location dependent device locking, firewall, intrusion  ...  The RBAC profile of XACML implements role based access control, however not with the same level of granularity as native RBAC solutions and also with deficiencies when it comes to enforcing separation  ... 
doi:10.1007/978-3-642-30244-2_15 fatcat:rf2dl6xmd5e2hjhtvejpdodt64

Runtime Administration of an RBAC Profile for XACML

Min Xu, D. Wijesekera, Xinwen Zhang
2011 IEEE Transactions on Services Computing  
In order to solve this concurrency problem, we propose a session-aware administrative model for RBAC, and enhance the XACML policy evaluation runtime using a locking mechanism.  ...  XACML has an RBAC profile (XACML-RBAC) to support role-based access control policies. We extend this profile with an administrative RBAC profile, which we refer to as the XACML-ARBAC profile.  ...  His recent research focuses on secure and trusted mobile platforms, applications, and services. He is a member of the IEEE.  ... 
doi:10.1109/tsc.2010.27 fatcat:dhmi7bzptfhcla7xtjy5smsiw4

Towards movement-aware access control

Maria Luisa Damiani, Claudio Silvestri
2008 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS - SPRINGL '08  
Following the experience of design of the GEO-RBAC model, in this paper we want to look at those models with a critical eye and point out open conceptual and architectural challenges.  ...  The objective of spatially-aware access control models is to regulate the access to protected objects based on position information.  ...  The system consists of the Administration Workbench for policy specification; and the Run Time Enforce- BEYOND GEO-RBAC Now we want to make a step ahead and look beyond GEO-RBAC.  ... 
doi:10.1145/1503402.1503410 dblp:conf/gis/DamianiS08 fatcat:sitb6gihdffivpcz7i23g6z66a

Using Workflow for Dynamic Security Context Management in Grid-based Applications

Yuri Demchenko, Leon Gommans, Cees Laat, Arie Taal, Alfred Wan, Olle Mulmo
2006 2006 7th IEEE/ACM International Conference on Grid Computing  
We investigate the use of workflow concepts for the required orchestration of multiple Grid resources and/or services across multiple administrative and security domains.  ...  Additionally, the paper analyses what possibilities of expressing and handling dynamic security contexts are available in XACML and SAML, and how the VO concept can be used for managing dynamic security  ...  The authors believe that the briefly described here research and development in the area of providing flexible dynamic access control architecture will be useful for wider research and development community  ... 
doi:10.1109/icgrid.2006.311000 dblp:conf/grid/DemchenkoGLTWM06 fatcat:k2t3xbcqcrg7vc4kqw6k5kmhz4

A Trust-Based Context-Aware Access Control Model for Web-Services

Rafae Bhatti, Elisa Bertino, Arif Ghafoor
2005 Distributed and parallel databases  
Amongst them are the lack of context-aware models for access control, and reliance on identity or capability-based access control schemes.  ...  In this paper, we motivate the design of an access control scheme that addresses these issues, and propose an extended, trust-enhanced version of our XML-based Role Based Access Control (X-RBAC) framework  ...  X-RBAC was designed to readily integrate within the XML framework, and emphasized simple, yet effective, administration through the use of RBAC.  ... 
doi:10.1007/s10619-005-1075-7 fatcat:nrqnmezalvgj7mz3skakmewbki

A trust-based context-aware access control model for Web-services

R. Bhatti, E. Bertino, A. Ghafoor
2004 Proceedings. IEEE International Conference on Web Services, 2004.  
Amongst them are the lack of context-aware models for access control, and reliance on identity or capability-based access control schemes.  ...  In this paper, we motivate the design of an access control scheme that addresses these issues, and propose an extended, trust-enhanced version of our XML-based Role Based Access Control (X-RBAC) framework  ...  Acknowledgements Portions of this work have been supported by the sponsors of the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University, and the National  ... 
doi:10.1109/icws.2004.1314738 dblp:conf/icws/BhattiBG04 fatcat:wxzpemmf5nhudmxxmfrcvffcai

Secure Data Sharing and Processing in Heterogeneous Clouds

Bojan Suzic, Andreas Reiter, Florian Reimair, Daniele Venturi, Baldur Kubo
2015 Procedia Computer Science  
These deployments vary both in the size and capabilities, as well as in the range of employed technologies and processes.  ...  In this work we focus on the federation of private clouds and the approaches that enable secure data sharing and processing among the collaborating infrastructures and services of public entities.  ...  Acknowledgements This work has been sponsored by European Commission through SUNFISH project, executed under the framework of the Horizon 2020 Research and Innovation Programme.  ... 
doi:10.1016/j.procs.2015.09.228 fatcat:yfre4npnhrgfri4gnx3mymv2ze

Controlled BTG: Toward Flexible Emergency Override in Interoperable Medical Systems

Qais Tasali, Christine Sublett, Eugene Vasserman
2018 EAI Endorsed Transactions on Security and Safety  
METHODS: We do this by constructing a BTG "meta-policy" which works with existing access control policies by explicitly allowing override when requested.  ...  RESULTS: We present a sample BTG policy and formally verify that the resulting combined set of access control policies correctly satisfies the goals of the original policy set and allows expanded access  ...  The main components of a XACML reference architecture [11] are: the Policy Decision Point (PDP), the Policy Enforcement Point (PEP), the Policy Access/Administration Point (PAP), and the Policy Information  ... 
doi:10.4108/eai.13-7-2018.163213 fatcat:p6nungyyjngxfj2d3df73okgae

Survey on delegated and self-contained authorization techniques in CPS and IoT

Sreelakshmi Vattaparambil Sudarsan, Olov Schelen, Ulf Bodin
2021 IEEE Access  
A specific target of this paper is authorization in the Cyber Physical system and Internet of Things networks with non-constrained devices in industrial context with mobility, subcontractors, and autonomous  ...  and tokens.  ...  The major security components in XACML 702 such as Policy Administration Point (PAP), Policy Decision 703 Point (PDP), and Policy Information Point (PIP) are inter-704 dependent.  ... 
doi:10.1109/access.2021.3093327 fatcat:amkmt5e2hbdthhjzzi5bycjlia

X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control

Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James B. D. Joshi
2005 ACM Transactions on Privacy and Security  
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for efficient resource utilization, scalability, and flexibility.  ...  Our specification language is based on the GTRBAC model that incorporates the content-and context-aware dynamic access control requirements of an enterprise.  ...  It performs the policy administration and enforcement tasks. 6.3.1 Policy Administration.  ... 
doi:10.1145/1065545.1065547 fatcat:krptzlclxfbkxmtyedpzcfseeu

Context-Sensitive Security Framework for Pervasive Environments

Charles-eric Pigeot, Yann Gripay, Marian Scuturici, Jean-marc Pierson
2007 Fourth European Conference on Universal Multiservice Networks (ECUMN'07)  
We propose a model of security and privacy for pervasive environments, integrated with an architecture, namely PerSE, in which privacy is a main concern and is at the core of the conception.  ...  Opportunities given by pervasive systems, both in terms of applications and services to the user are manifold and very promising.  ...  RBAC is particularly well adapted to organizations like hospitals, enterprises, etc. with a very precise and predefined structure because it enables administrators to define and specify security policies  ... 
doi:10.1109/ecumn.2007.13 dblp:conf/ecumn/PigeotGSP07 fatcat:apbgwt7nhzc3bhmhqvzm4yvima

An Authorization Framework using Building Information Models

N. Skandhakumar, J. Reid, E. Dawson, R. Drogemuller, F. Salim
2012 Computer journal  
By placing processes in a spatial context, decision-making can be improved, with positive flow-on effects for security and efficiency.  ...  With a view to addressing these requirements we present a survey of relevant spatiotemporal access control models, focusing on features applicable to building information models and highlighting capability  ...  More details on Airports of the Future and its participants can be found at www.airportsofthefuture.qut.edu.au.  ... 
doi:10.1093/comjnl/bxs098 fatcat:pgqaf3thrzcurao55id5c3kh5q

Towards Session-Aware RBAC Delegation: Function Switch [chapter]

Meriam Ben Ghorbel-Talbi, Frédéric Cuppens, Nora Cuppens-Boulahia, Stéphane Morucci
2013 Lecture Notes in Computer Science  
This paper shows how to extend RBAC sessions with dynamic aspects to deal with user switch.  ...  We discuss in this paper how to manage users privileges in the dynamic session and how to deal with the switch mechanism.  ...  The project is coordinated by EADS Defense and Security Systems, France.  ... 
doi:10.1007/978-3-642-35890-6_21 fatcat:pgxfes6fn5gtvfnbupoes2mz74

Context-Dependent Access Control for Contextual Information

Christin Groba, Stephan Grob, Thomas Springer
2007 The Second International Conference on Availability, Reliability and Security (ARES'07)  
The gathering and disclosure of contextual information on the one hand enables the improvement of system behaviour towards a more autonomous and adaptive behaviour but on the other hand raises privacy  ...  And thirdly, it introduces individual roles for each user and thus replaces the centrally defined role model of common rolebased access control by distinct models for each user.  ...  Therefore, the global, centralized policy enforcement shifts towards individual, decentralized policies and role concepts.  ... 
doi:10.1109/ares.2007.61 dblp:conf/IEEEares/GrobaGS07 fatcat:y56jqvddw5d5xgepiplw7mabo4
« Previous Showing results 1 — 15 out of 146 results