A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders

被引:2
作者
Bijon, Khalid Zaman [1 ,2 ]
Ahmed, Tahmina [1 ,2 ]
Sandhu, Ravi [1 ,2 ]
Krishnan, Ram [1 ,3 ]
机构
[1] Univ Texas San Antonio, Inst Cyber Secur, San Antonio, TX 78249 USA
[2] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX USA
来源
PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012) | 2012年
关键词
Group Centric Collaboration; Information Sharing; Lattice Based Access Control;
D O I
10.4108/icst.collaboratecom.2012.250468
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For various reasons organizations need to collaborate with external consultants, e. g. domain specialists, on specific projects. Many security-oriented organizations deploy multi-level systems which enforce one directional information flow in a lattice of security labels. However, traditional lattice constructions are not suitable for accommodating external consultants, since such consultants are not "true insiders" but rather " expedient insiders" who should receive much more limited privileges than employees. An authorization model for group-centric collaboration with expedient insiders (GEl) has been recently proposed, wherein organizations create groups and replicate the organizational lattice with selected content for such collaborations [4]. Motivated by GEl, in this paper, we formulate a novel lattice construction wherein a new collaboration category is introduced for each new collaboration group, in a manner significantly different from the usual process of defining new security categories in a lattice. In particular, a collaboration category brings together only the required objects and users. We develop a formal model for lattices with collaborative compartments (LCC) comprising administrative and operational parts covering the life-cycle of such collaborations. We formally prove the equivalence of LCC and GEl, thereby precisely characterizing the information flow and security properties of GEl which heretofore had only been informally considered. This equivalence shows that GEl can be realized via LBAC with minimal operational disruptions.
引用
收藏
页码:200 / 209
页数:10
相关论文
共 11 条
  • [1] Ahmed T., 2012, CSTR2012010 UTSA
  • [2] [Anonymous], 1976, TECH REP
  • [3] [Anonymous], INTEGRITY CONSIDERAT
  • [4] Bijon Khalid, 2012, INT S SEC COLL TECHN
  • [5] LATTICE MODEL OF SECURE INFORMATION-FLOW
    DENNING, DE
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (05) : 236 - 243
  • [6] Jafarian J. H., 2009, ISECURE
  • [7] Krishnan R., 2011, TISSEC
  • [8] Park J., 2004, ACM Transactions on Information and Systems Security, V7, P128, DOI 10.1145/984334.984339
  • [9] Ray I., 2006, COMPUTERS SECURITY, V25
  • [10] Sandhu R.S., 1993, IEEE Computer, V26, P9, DOI DOI 10.1109/2.241422