Integration of Heterogeneous Policies for Trust Management

被引:2
作者
Abdi, Samane [1 ]
机构
[1] Natl Univ Ireland Univ Coll Cork, Dept Comp Sci, Insight Ctr Data Analyt, Cork, Ireland
来源
2014 38TH ANNUAL IEEE INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW 2014) | 2014年
关键词
Integration; Policy; Permission; Trust management; Open environments;
D O I
10.1109/COMPSACW.2014.71
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we demonstrate an ontology-based approach that allows integration of heterogeneous security policies for subterfuge safe trust management. This approach, SSAL O, represents the Subterfuge Safe Authorization Language (SSAL) using a description logic subset of the Web Ontology Language, and Semantic Web Rule Language. This implementation provides a policy engine that enforces subterfuge safe authorization of requests for accessing the protected resources of distributed principals. SSAL O provides a common domain model for integration of heterogeneous security policies. This approach is useful for secure cooperation and interoperability among principals in open environments where each principal may have a different security policy and different implementation. We discuss the characteristics of SSAL O in capturing SSAL and providing a framework for secure and dynamic integration of heterogeneous security policies specified by distributed principals in different domains. We employ various tools such as Protege and Pellet to implement our model.
引用
收藏
页码:413 / 419
页数:7
相关论文
共 22 条
  • [1] Abdi S., 2014, COMP SOFTW IN PRESS
  • [2] An Autonomic Trust Management Framework For Secure Dynamic Coalition Cooperation
    Abdi, Samane
    [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON AND 10TH INTERNATIONAL CONFERENCE ON AUTONOMIC AND TRUSTED COMPUTING (UIC/ATC) UBIQUITOUS INTELLIGENCE AND COMPUTING, 2013, : 422 - 429
  • [3] [Anonymous], 2003, DESCRIPTION LOGIC HD
  • [4] [Anonymous], 2001, KNOWLEDGE SYSTEMS LA
  • [5] Blaze M, 1999, LECT NOTES COMPUT SC, V1550, P59
  • [6] Blaze M., 2000, ROLE TRUST MANAGEMEN
  • [7] Bradshaw J.M., 2003, P AUTONOMOUS AGENTS, P835, DOI DOI 10.1145/860575.860709
  • [8] Cantor S., 2005, ASSERTIONS PROTOCOLS
  • [9] Dean M., SWRL SEMANTIC WEB RU
  • [10] Finin T, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P73