Fine-grained integration of access control policies

被引:19
|
作者
Rao, Prathima [1 ]
Lin, Dan [2 ]
Bertino, Elisa [1 ]
Li, Ninghui [1 ]
Lobo, Jorge [3 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Missouri Univ Sci & Technol, Dept Comp Sci, Rolla, MO USA
[3] IBM TJ Watson Res Ctr, Yorktown Hts, NY USA
关键词
Access control; Algebra; Framework; Policy integration; XACML;
D O I
10.1016/j.cose.2010.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration requirements that the various parties may have. In this paper, we introduce an algebra for fine-grained integration of sophisticated policies. The algebra, which consists of three binary and two unary operations, is able to support the specification of a large variety of integration constraints. For ease of use, we also introduce a set of derived operators and provide guidelines for users to edit a policy with desired properties. To assess the expressive power of our algebra, we define notion of completeness and prove that our algebra is complete and minimal with respect to the notion. We then propose a framework that uses the algebra for the fine-grained integration of policies expressed in XACML. We also present a methodology for generating the actual integrated XACML policy, based on the notion of Multi-Terminal Binary Decision Diagrams. Experimental results have demonstrated both effectiveness and efficiency of our approach. In addition, we also discuss issues regarding obligations. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:91 / 107
页数:17
相关论文
共 50 条
  • [41] Fine-grained access control based on Trusted Execution Environment
    Fan, Yongkai
    Liu, Shengle
    Tan, Gang
    Qiao, Fei
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 : 551 - 561
  • [42] Linkable and traceable anonymous authentication with fine-grained access control
    Li, Peng
    Lai, Junzuo
    Zhou, Dehua
    Huang, Lianguan
    Sun, Meng
    Wu, Wei
    Yang, Ye
    FRONTIERS OF COMPUTER SCIENCE, 2025, 19 (02)
  • [43] Fine-grained Access Control Scheme Based on Cloud Storage
    Niu, Xiaojie
    2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 512 - 515
  • [44] Automatic fine-grained access control in SCADA by machine learning
    Zhou, Lu
    Su, Chunhua
    Li, Zhen
    Liu, Zhe
    Hancke, Gerhard P.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 548 - 559
  • [45] FINE-GRAINED TRUSTED CONTROL METHODS FOR IOT BOUNDARY ACCESS
    Wang, Jie
    Liu, Chang
    Zhu, Guowei
    Liu, Xiaojun
    Xiao, Bibo
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2025, 26 (01): : 180 - 190
  • [46] Providing fine-grained access control for Java']Java programs
    Pandey, R
    Hashii, B
    ECOOP'99 - OBJECT-ORIENTED PROGRAMMING, 1999, 1628 : 449 - 473
  • [47] Fine-Grained Task Access Control System for Mobile Crowdsensing
    Wang, Jingwei
    Yin, Xinchun
    Ning, Jianting
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] Using XACML for Embedded and Fine-Grained Access Control Policy
    Hsieh, George
    Foster, Keith
    Emamali, Gerald
    Patrick, Gregory
    Marvel, Lisa
    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 462 - +
  • [49] Bloccess: Enabling Fine-Grained Access Control Based on Blockchain
    Ding, Yepeng
    Sato, Hiroyuki
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2023, 31 (01)
  • [50] Bloccess: Enabling Fine-Grained Access Control Based on Blockchain
    Yepeng Ding
    Hiroyuki Sato
    Journal of Network and Systems Management, 2023, 31