首页> 外文OA文献 >Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems
【2h】

Role-Based Access Control Administration of Security Policies and Policy Conflict Resolution in Distributed Systems

机译:分布式系统中基于角色的访问控制安全策略管理和策略冲突解决

摘要

Security models using access control policies have over the years improved from Role-based access control (RBAC) to newer models which have added some features like support for distributed systems and solving problems in older security policy models such as identifying policy conflicts. Access control policies based on hierarchical roles provide more flexibility in controlling system resources for users. The policies allow for granularity when extended to have both allow and deny permissions as well as weighted priority attribute for the rules in the policies. Such flexibility allows administrators to succinctly specify access for their system resources but also prone to conflict.This study found that conflicts in access control policies were still a problem even in recent literature. There have been successful attempts at using algorithms to identify the conflicts. However, the conflicts were only identified but not resolved or averted and system administrators still had to resolve the policy conflicts manually. This study proposed a weighted attribute administration model (WAAM) containing values that feed the calculation of a weighted priority attribute. The values are tied to the user, hierarchical role, and secured objects in a security model to ease their administration and are included in the expression of the access control policy. This study also suggested a weighted attribute algorithm (WAA) using these values to resolve any conflicts in the access control policies. The proposed solution was demonstrated in a simulation that combined the WAAM and WAA. The simulationu27s database used WAAM and had data records for access control policies, some of which had conflicts. The simulation then showed that WAA could both identify and resolve access control policy (ACP) conflicts while providing results in sub-second time. The WAA is extensible so implementing systems can extend WAA to meet specialized needs. This study shows that ACP conflicts can be identified and resolved during authorization of a user into a system.
机译:多年来,使用访问控制策略的安全模型已经从基于角色的访问控制(RBAC)改进到了新的模型,这些模型增加了一些功能,例如对分布式系统的支持以及解决旧安全策略模型中的问题,例如识别策略冲突。基于分层角色的访问控制策略为用户控制系统资源提供了更大的灵活性。策略在扩展时具有粒度,以具有策略中的规则的允许和拒绝权限以及加权优先级属性。这种灵活性允许管理员简洁地指定其系统资源的访问权限,但也容易发生冲突。这项研究发现,即使在最近的文献中,访问控制策略中的冲突仍然是一个问题。已经成功地尝试使用算法来识别冲突。但是,仅识别出冲突,但未解决或避免冲突,系统管理员仍必须手动解决策略冲突。这项研究提出了一个加权属性管理模型(WAAM),其中包含为加权优先级属性的计算提供数据的值。这些值与安全模型中的用户,层次结构角色和受保护对象绑定在一起,以简化其管理,并包含在访问控制策略的表达式中。这项研究还建议使用这些值的加权属性算法(WAA)解决访问控制策略中的任何冲突。在结合WAAM和WAA的模拟中演示了提出的解决方案。该模拟数据库使用WAAM,并且具有访问控制策略的数据记录,其中一些记录存在冲突。然后仿真显示WAA可以识别并解决访问控制策略(ACP)冲突,同时在不到一秒的时间内提供结果。 WAA是可扩展的,因此实施系统可以扩展WAA以满足特殊需求。这项研究表明,在用户授权进入系统期间,可以识别并解决ACP冲突。

著录项

  • 作者

    Kibwage Stephen Sakawa;

  • 作者单位
  • 年度 2015
  • 总页数
  • 原文格式 PDF
  • 正文语种
  • 中图分类
  • 入库时间 2022-08-20 20:17:27

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号