The increased availability of tools and technologies to access and use the data has made more urgent the needs for data protection. Moreover, emerging applications and data models call for more flexible and expressive...
详细信息
ISBN:
(纸本)1581133502
The increased availability of tools and technologies to access and use the data has made more urgent the needs for data protection. Moreover, emerging applications and data models call for more flexible and expressive accesscontrolmodels. This has lead to an extensive research activity that has resulted in the definition of a variety of accesscontrolmodels, that greatly differ with respect to the accesscontrol policies they can support. The need thus arises of developing some sort of tools that make it possible to reason about the expressive power of such models and to make a comparison among the various proposals. In this paper we make a first step in this direction by proposing a formal framework for reasoning about accesscontrolmodels. The framework we propose is based on a logical formalism and is general enough to model both discretionary and mandatory accesscontrol policies. Each instance of the proposed framework corresponds to a C-Datalog program [8], interpreted according to a stable model semantics. In the paper, besides giving the syntax and the formal semantic of our framework, we show some examples of its application.
Research in the area of role-based accesscontrol has made fast progress over the last few years. However, little has been done to identify and describe existing role-based accesscontrol systems within large organisa...
详细信息
ISBN:
(纸本)1581133502
Research in the area of role-based accesscontrol has made fast progress over the last few years. However, little has been done to identify and describe existing role-based accesscontrol systems within large organisations. This paper describes the accesscontrol system of a major European Bank. An overview of the system's structure, its administration and existing control principles constraining the administration is given. In addition, we provide an answer to a key question - the ratio of the number of roles to the system user population - which was raised in the recent RBAC2000 Workshop. Having described certain weaknesses of the Bank's system, the case study is extended to a comparison between the system and the RBAC96 models. In particular the issues of inheritance and grouping are addressed.
General accesscontrolmodels enable flexible expression of accesscontrol policies, but they make the verification of whether a particular accesscontrol configuration is safe (i.e., prevents the leakage of a permiss...
详细信息
ISBN:
(纸本)1581133502
General accesscontrolmodels enable flexible expression of accesscontrol policies, but they make the verification of whether a particular accesscontrol configuration is safe (i.e., prevents the leakage of a permission to an unauthorized subject) difficult. The current approach to expressing safety policy in such models is to use constraints. When the constraints are verified, then the configuration is verified to be safe. However, the addition of constraints to an accesscontrol configuration significantly increases its complexity, so it quickly becomes difficult to understand the accesscontrol policy expressed in the configuration such that future changes can be made correctly. We propose an approach whereby the complexity of each accesscontrol configuration is estimated, so the administrators can see the effect of a configuration change on the future ability to maintain the configuration. We identify metrics for making complexity estimates and evaluate these metrics on some constraint examples. Our goal is to enable the use of flexible accesscontrolmodels for safety-critical systems by permitting limited use of constraints that do not complicate the configuration beyond a maintainable complexity.
As Internet usage proliferates, resource security becomes both more important and more complex. Contemporary users and systems are ill-equipped to deal with the complex security demands of a ubiquitous, insecure netwo...
详细信息
ISBN:
(纸本)1581133502
As Internet usage proliferates, resource security becomes both more important and more complex. Contemporary users and systems are ill-equipped to deal with the complex security demands of a ubiquitous, insecure network. The YGuard accesscontrol Model, developed at Brigham Young University, employs set-based accesscontrol lists, XML, and a modular architecture to provide users with an intuitive, extensible, and efficient method of controlling access to system resources. The implementation of YGuard in XWeb, a research project designed to replace HTTP, demonstrates the power and flexibility of the model and its potential for use in diverse modern systems. This paper examines the effectiveness of the YGuard accesscontrol Model in solving many of the accesscontrol problems associated with the modern, networked computing environment.
This paper presents the accesscontrol mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Ac...
详细信息
ISBN:
(纸本)1581133502
This paper presents the accesscontrol mechanisms in Windows 2000 that enable fine-grained protection and centralized management. These mechanisms were added during the transition from Windows NT 4.0 to support the Active Directory, a new feature in Windows 2000. We first extended entries in accesscontrol lists to allow rights to apply to just a portion of an object. The second extension allows centralized management of object hierarchies by specifying more precisely how accesscontrol lists are inherited. The final extension allows users to limit the rights of executing programs by restricting the set of objects they may access. These changes have the combined effect of allowing centralized management of accesscontrol while precisely specifying which accesses are granted to which programs.
We discuss the integration of contextual information with team-based accesscontrol. The TMAC model was formulated by Thomas in [1] to provide accesscontrol for collaborative activity best accomplished by teams of us...
详细信息
ISBN:
(纸本)1581133502
We discuss the integration of contextual information with team-based accesscontrol. The TMAC model was formulated by Thomas in [1] to provide accesscontrol for collaborative activity best accomplished by teams of users. In TMAC, accesscontrol revolves around teams, where a "team" is an abstraction that encapsulates a collection of users in specific roles and collaborating with the objective of accomplishing a specific task or goal. Users who belong to a team are given access to resources used by a team. However, the effective permissions of a user are always derived from permission types defined for roles that the user belongs to. TMAC is an example of what we call "active security models". These models are aware of the context associated with an ongoing activity in providing accesscontrol and thus distinguish the passive concept of permission assignment from the active concept of context-based permission activation. The ability to integrate contextual information allows models such as TMAC to be flexible and express a variety of access policies that can provide tight and just-in-time permission activation.
As more businesses engage in globalization, inter-organizational collaborative computing grows in importance. Since we cannot expect homogeneous computing environments in participating organizations, heterogeneity and...
详细信息
ISBN:
(纸本)1581133502
As more businesses engage in globalization, inter-organizational collaborative computing grows in importance. Since we cannot expect homogeneous computing environments in participating organizations, heterogeneity and Internet-based technology are prevalent in inter-organizational collaborative computing environments. One technology that provides solutions for data sharing and work coordination at the global level is inter-organizational workflow. In this paper, we investigate the accesscontrol requirements for inter-organizational workflow. We then present accesscontrol solutions for inter-organizational workflow based on our implementation. Many of the requirements and solutions in this paper address the scalability of existing security solutions, the separation of inter-organizational workflow security from concrete organization level security enforcement, and the enforcement of fine-grained accesscontrol for inter-organizational workflow.
OASES is a role-based accesscontrol architecture for achieving secure interoperation of services in an open, distributed environment. Services define roles and implement formally specified policy for role activation ...
详细信息
ISBN:
(纸本)1581133502
OASES is a role-based accesscontrol architecture for achieving secure interoperation of services in an open, distributed environment. Services define roles and implement formally specified policy for role activation and service use;users must present the required credentials, in the specified context, in order to activate a role or invoke a service. Roles are activated for the duration of a session only. In addition, a role is deactivated immediately if any of the conditions of the membership rule associated with its activation becomes false. OASIS does not use role delegation but instead defines the notion of appointment, whereby a user in some role may issue an appointment certificate to some other user. The role activation conditions of services may include appointment certificates, prerequisite roles and environmental constraints. We motivate our approach and formalise OASIS. First, a basic model is presented followed by an extended model which includes parameterisation.
Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the...
详细信息
ISBN:
(纸本)1581134282
Beamforming antennas have the potential to provide a fundamental breakthrough in ad hoc network capacity. We present a broad-based examination of this potential, focusing on exploiting the longer ranges as well as the reduced interference that beamforming antennas can provide. We consider a number of enhancements to a conventional ad hoc network system, and evaluate the impact of each enhancement using simulation. Such enhancements include "aggressive" and "conservative" channel accessmodels for beamforming antennas, link power control, and directional neighbor discovery. Our simulations are based on detailed modeling of steered as well as switched beams using antenna patterns of varying gains, and a realistic radio and propagation model. For the scenarios studied, our results show that beamforming can yield a 28% to 118% (depending upon the density) improvement in throughput, and up to a factor-of-28 reduction in delay. Our study also tells us which mechanisms are likely to be more effective and under what conditions, which in turn identifies areas where future research is needed.
暂无评论