首页> 外文学位 >Generalization and enforcement of role-based access control using a novel event-based approach.
【24h】

Generalization and enforcement of role-based access control using a novel event-based approach.

机译:使用新颖的基于事件的方法对基于角色的访问控制进行通用化和强制执行。

获取原文
获取原文并翻译 | 示例

摘要

Protecting information against unauthorized access is a key issue in information system security. Advanced access control models and mechanisms have now become necessary for applications and systems due to emerging acts, such as the Health Insurance Portability and Accountability Act (HIPAA) and the Sarbanes-Oxley Act. Role-Based Access Control (RBAC) is a viable alternative to traditional discretionary and mandatory access control.; In this thesis, we have focused on several aspects of RBAC; including generalization and enforcement of RBAC; by exploiting and extending a well-established event-based framework that has a solid theoretical foundation. Specifically, we have addressed the following problems and made the following contributions: (1) Enforcement of existing RBAC Approaches: Security mechanisms are required for enforcing security policies. We have provided a flexible event-based technique for enforcing the RBAC standard and other current extensions in a uniform manner using an event framework. We have extended the event specification and detection with interval-based semantics for event operators and alternative actions for active rules. (2) Generalization of RBAC and Snoop: We have generalized RBAC policies with expressive event pattern constraints. We have shown how to model diverse constraints, such as precedence, dependency, non-occurrence, and their combinations, using event patterns that are not available in existing RBAC approaches. Event patterns are event expressions that have simple and complex events as constituent events and they control the state change. Snoop, an event specification language, provides the basis for extensions needed to support the generalized RBAC. The generalization of RBAC using constraints based on event patterns can be accomplished by the extended Snoop. (3) Enforcement of Generalized RBAC: We have shown the modeling and enforcement of generalized RBAC policies using the extended local event detector (LED). We have introduced event registrar graphs for capturing simple and complex event occurrences and keeping track of event patterns. (4) Usability in RBAC: We have enhanced the usability of RBAC by adding an intelligent module for discovering roles and guiding (or prompting) the user to acquire appropriate roles for performing operations on objects. This approach relieves the user from the details of role-permission assignment and allows concentrating on their task. We have developed several algorithms for discovering roles, and Analyzed their complexity and effectiveness. (5) Novel Applications: We have developed various applications for demonstrating the applicability of the results obtained in this thesis. (i) We have shown how role-based security policies can be supported in web gateways using a smart push-pull approach. (ii) We have shown how event operators based on interval-based semantics can be utilized for information filtering. (iii) We provided an integrated model for advanced data stream applications that supports not only stream processing but also complicated event and rule processing. (Abstract shortened by UMI.)
机译:保护信息免遭未经授权的访问是信息系统安全中的关键问题。由于出现了新的法案,例如《健康保险可移植性和责任法案》(HIPAA)和《萨班斯-奥克斯利法案》,先进的访问控制模型和机制已成为应用程序和系统必需的。基于角色的访问控制(RBAC)是传统的酌处和强制访问控制的可行替代方案。在本文中,我们集中在RBAC的几个方面。包括RBAC的推广和执行;通过开发和扩展具有坚实的理论基础的,建立良好的基于​​事件的框架。具体来说,我们解决了以下问题并做出了以下贡献:(1)强制执行现有的RBAC方法:实施安全策略需要安全机制。我们提供了一种基于事件的灵活技术,可使用事件框架以统一的方式实施RBAC标准和其他当前扩展。我们扩展了事件指定和检测功能,为事件操作符提供了基于间隔的语义,为活动规则提供了替代操作。 (2)RBAC和Snoop的泛化:我们已将具有表达事件模式约束的RBAC策略泛化。我们已经展示了如何使用现有RBAC方法中不可用的事件模式来建模各种约束,例如优先级,依赖项,不出现及其组合。事件模式是具有简单事件和复杂事件作为构成事件的事件表达式,它们控制状态变化。 Snoop是一种事件规范语言,它为支持通用RBAC所需的扩展提供了基础。使用基于事件模式的约束的RBAC泛化可以通过扩展的Snoop来完成。 (3)通用RBAC的执行:我们已经展示了使用扩展本地事件检测器(LED)的通用RBAC策略的建模和执行。我们引入了事件注册器图,以捕获简单和复杂的事件发生并跟踪事件模式。 (4)RBAC的可用性:我们增加了RBAC的可用性,方法是添加一个智能模块来发现角色并指导(或提示)用户获取适当的角色以对对象执行操作。这种方法使用户摆脱了角色权限分配的细节,并且可以专注于他们的任务。我们已经开发了几种发现角色的算法,并分析了它们的复杂性和有效性。 (5)新颖的应用程序:我们已经开发了各种应用程序来证明本文所获得的结果的适用性。 (i)我们已经展示了如何使用智能推挽方法在Web网关中支持基于角色的安全策略。 (ii)我们已经展示了如何将基于基于间隔的语义的事件运算符用于信息过滤。 (iii)我们为高级数据流应用程序提供了一个集成模型,该模型不仅支持流处理,还支持复杂的事件和规则处理。 (摘要由UMI缩短。)

著录项

  • 作者

    Adaikkalavan, Raman.;

  • 作者单位

    The University of Texas at Arlington.;

  • 授予单位 The University of Texas at Arlington.;
  • 学科 Computer Science.
  • 学位 Ph.D.
  • 年度 2006
  • 页码 302 p.
  • 总页数 302
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 自动化技术、计算机技术;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号