2011 5th International Conference on Network and System Security 2011
DOI: 10.1109/icnss.2011.6060001
|View full text |Cite
|
Sign up to set email alerts
|

A secure, constraint-aware role-based access control interoperation framework

Abstract: Abstract-With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that limit the times when the users can access the resources, and separation of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 24 publications
0
14
0
Order By: Relevance
“…On the other hand, the user owner needs to monitor or constrain the roles assigned to its users in other domains in order to prevent violations of security in multi-domain interoperation [7,18]. In this setting, the collaborating domains should both have control over the cross-domain access instead of only one of them.…”
Section: Background and Motivationmentioning
confidence: 99%
“…On the other hand, the user owner needs to monitor or constrain the roles assigned to its users in other domains in order to prevent violations of security in multi-domain interoperation [7,18]. In this setting, the collaborating domains should both have control over the cross-domain access instead of only one of them.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Also, the conflict duties may be associated with different cloud services. In this case, the constraint policy composition process can become very complicated . Thus, the CSP should be responsible to identify potential conflict roles.…”
Section: Mtas Modelsmentioning
confidence: 99%
“…Addressing multi‐domain secure interoperation, the role mapping approaches allow external users in trusted domains to acquire privileges in a local domain through role hierarchy relations. These approaches focus on extending RBAC models and enabling interoperation by mapping roles between domains.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There is an integer programming based approach to resolve the conflicts in the principles of secure inter operation of RBAC models introduced by Shafiq et al [17]. Nathalie et al [18] has proposed a role based framework to enable secure inter operation among multiple domains with temporal and separation of duty constraints. A formal security policy model for multi-domain mobile network has been proposed by Unal et al [4] deals with location and mobility constraints , role hierarchy mapping , inter domain access right , inter domain services and separation of duty.…”
Section: Introductionmentioning
confidence: 99%