首页> 外文会议>International Conference on Information Systems Security(ICISS 2005); 20051219-21; Kolkata(IN) >An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies
【24h】

An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies

机译:基于属性图的方法,将本地访问控制策略映射到基于凭据的访问控制策略

获取原文
获取原文并翻译 | 示例

摘要

Due to the proliferation of the Internet and web based technologies, today's collaborations among organizations are increasingly short-lived, dynamic, and therefore formed in an ad-hoc manner to serve a specific purpose. Such example environments include web-services, dynamic coalitions, grid computing and ubiquitous computing. These environments necessitate the need for dynamic, efficient and secure sharing of resources among disparate organizations. Although such secure sharing of resources can be achieved by means of traditional access control and authentication mechanisms, they are administratively difficult when the partnerships and interactions are short-lived and constantly changing. When allowing sharing of resources, the organization must ensure that its own security policies are adhered to. Our proposal is to allow users, external to the organization, access to internal resources of the organization, if they possess certain attributes similar to those possessed by the internal users. We begin by first examining the internal security policies within an organization and attempt to map them to credential based policies. In essence, we identify the attributes possessed by internal users relevant to a security policy, and map them to credential attributes that are understood across organizations. Access can then be granted to users once they submit these required credentials with the identified attributes. We present an attribute graph based methodology to accomplish such a mapping. In this paper, we assume that the local access control policies are limited to Role Based Access Control (RBAC) policies.
机译:由于Internet和基于Web的技术的激增,当今组织之间的协作越来越短,动态,因此以临时方式形成以服务于特定目的。这样的示例环境包括Web服务,动态联盟,网格计算和普适计算。这些环境需要在不同的组织之间动态,高效和安全地共享资源。尽管可以通过传统的访问控制和身份验证机制来实现这种安全的资源共享,但是当伙伴关系和交互的生命周期短暂且不断变化时,它们在管理上会很困难。当允许资源共享时,组织必须确保遵守其自身的安全策略。我们的建议是允许组织外部的用户访问组织的内部资源,前提是它们具有与内部用户所拥有的相似的某些属性。我们首先检查组织内部的内部安全策略,然后尝试将它们映射到基于凭据的策略。本质上,我们确定内部用户拥有的与安全策略相关的属性,并将它们映射到组织之间可以理解的凭据属性。一旦用户提交了具有已标识属性的这些必需凭据,便可以向用户授予访问权限。我们提出一种基于属性图的方法来完成这种映射。在本文中,我们假定本地访问控制策略仅限于基于角色的访问控制(RBAC)策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号