On the Unification of Access Control and Data Services

被引:0
作者
Ferraiolo, David [1 ]
Gavrila, Serban [1 ]
Jansen, Wayne [2 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
[2] Bayview Behav Consulting, Point Roberts, WA 98281 USA
来源
2014 IEEE 15TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI) | 2014年
关键词
Access Control; Data Services; Access Control Policy; Policy Machine; Operating Environment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A primary objective of enterprise computing (via a data center, cloud, etc.) is the controlled delivery of data services (DS). Typical DSs include applications such as email, workflow, and records management, as well as system level features, such as file and access control management. Although access control (AC) currently plays an important role in imposing control over the execution of DS capabilities, AC can be more fundamental to computing than one might expect. That is, if properly designed, a single AC mechanism can simultaneously implement, control, and deliver capabilities of multiple DSs. The Policy Machine (PM) is an AC framework that has been designed with this objective in mind. This paper describes the PM features that provide a generic AC mechanism to implement DS capabilities, and comprehensively enforces mission tailored access control policies across DSs.
引用
收藏
页码:450 / 457
页数:8
相关论文
共 11 条
  • [1] [Anonymous], 4992013 INCITS AM NA
  • [2] [Anonymous], 2013, eXtensible Access Control Markup language (XACML) version 3.0
  • [3] Blaze M, 1999, LECT NOTES COMPUT SC, V1550, P59
  • [4] Decentralized trust management
    Blaze, M
    Feigenbaum, J
    Lacy, J
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 164 - 173
  • [5] BLAZE M, 1999, RFC2704 IETF
  • [6] Ferraiolo D.F., 2005, SACMAT '05, P11
  • [7] The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
    Ferraiolo, David
    Atluri, Vijayalakshmi
    Gavrila, Serban
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2011, 57 (04) : 412 - 424
  • [8] Ferraiolo David, 2014, 7987 NISTIR
  • [9] Ferraiolo David, 2013, IEEE COMPUT, V46, P10
  • [10] Hosmer H. H., 1993, Proceedings 1992-1993 ACM SIGSAC New Security Paradigms Workshop, P19, DOI 10.1145/283751.283768