首页> 外文期刊>ACM Transaction on Information and System Security >Group-Centric Secure Information-Sharing Models for Isolated Groups
【24h】

Group-Centric Secure Information-Sharing Models for Isolated Groups

机译:隔离组的以组为中心的安全信息共享模型

获取原文
获取原文并翻译 | 示例

摘要

Group-Centric Secure Information Sharing (g-SIS) envisions bringing users and objects together in a group to facilitate agile sharing of information brought in from external sources as well as creation of new information within the group. We expect g-SIS to be orthogonal and complementary to authorization systems deployed within participating organizations. The metaphors "secure meeting room" and "subscription service" characterize the g-SIS approach. The focus of this article is on developing the foundations of isolated g-SIS models. Groups are isolated in the sense that membership of a user or an object in a group does not affect their authorizations in other groups. Present contributions include the following: formal specification of core properties that at once help to characterize the family of g-SIS models and provide a "sanity check" for full policy specifications; informal discussion of policy design decisions that differentiate g-SIS policies from one another with respect to the authorization semantics of group operations; formalization and verification of a specific member of the family of g-SIS models; demonstration that the core properties are logically consistent and mutually independent; and identification of several directions for future extensions. The formalized specification is highly abstract. Besides certain well-formedness requirements that specify, for instance, a user cannot leave a group unless she is a member, it constrains only whether user-level read and write operations are authorized and it does so solely in terms of the history of group operations; join and leave for users and add, create, and remove for objects. This makes temporal logic one of the few formalisms in which the specification can be clearly and concisely expressed. The specification serves as a reference point that is the first step in deriving authorization-system component specifications from which a programmer with little security expertise could implement a high-assurance enforcement system for the specified policy.
机译:以组为中心的安全信息共享(g-SIS)设想将用户和对象聚集到一个组中,以促进从外部源引入的信息的敏捷共享以及在组内创建新信息。我们希望g-SIS与参与组织内部署的授权系统正交并互补。隐喻“安全会议室”和“订阅服务”是g-SIS方法的特征。本文的重点是开发隔离g-SIS模型的基础。在某种意义上说,组是隔离的,因为用户或对象在组中的成员资格不会影响其在其他组中的授权。目前的贡献包括:核心属性的正式规范,可立即帮助表征g-SIS模型家族,并为完整的政策规范提供“健全性检查”;非正式讨论策略设计决策,这些决策在组操作的授权语义方面将g-SIS策略彼此区分开;对g-SIS模型家族的特定成员进行形式化和验证;证明核心属性在逻辑上是一致且相互独立的;并确定未来扩展的几个方向。正式的规范是高度抽象的。除了某些特定的格式要求(例如,指定用户除非是成员才能离开组)外,它还限制用户级的读写操作是否得到授权,并且仅根据组操作的历史记录进行授权。 ;加入并留给用户,以及添加,创建和删除对象。这使得时间逻辑成为可以清晰,简洁地表达规范的少数形式主义之一。该规范作为参考点,是得出授权系统组件规范的第一步,缺乏安全专业知识的程序员可以从该规范中为指定的策略实施高保证的实施系统。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号