Design and Implementation of a Context-Based Security Model

被引:0
|
作者
Iijima, Tadashi [1 ]
Kido, Satoshi [1 ]
机构
[1] Keio Univ, Fac Sci & Technol, Tokyo 108, Japan
来源
KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014 | 2014年 / 466卷
关键词
Access Control Model; Context Sensibility; XACML; Domain Specific Language; PETRI NETS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a context-based security model and describes one of the design and implementation of enforcement mechanism of it. In this access control model, a kind of object-oriented petri-net with nets-within-nets semantics is adopted as a context representation. This approach is, particularly, expected to be suitable for dynamic access control within inter-organizational business processes. The overall architecture of the access control model is designed by extending XACML standard architecture. And a Scala-based internal Domain Specific Language is designed to specify security policies.
引用
收藏
页码:356 / 370
页数:15
相关论文
共 50 条
  • [1] Context-Based Risk-Adaptive Security Model and Conflict Management
    Teimourikia, Mahsa
    Marilli, Guido
    Fugini, Mariagrazia
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2016, PT I, 2016, 9827 : 121 - 135
  • [2] The Design and Implementation of Collaboration Service Integration Platform Based on Context-Aware Role Based Access Model
    Lu, Shu-Ping
    Shao, Kuei-Kai
    Chao, Yu-Nung
    Luo, Kuo-Shu
    Chen, Chi-Hua
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (01): : 295 - 305
  • [3] Design and implementation of multilevel security subsystem based on XACML and WEB services
    Jarmakiewicz, Jacek
    Podlasek, Tomasz
    2015 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2015,
  • [4] A Semantic-Aware Context-Based Access Control Framework for Mobile Web Services
    Shen, Haibo
    Cheng, Yu
    MECHANICAL ENGINEERING AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2012, 195-196 : 498 - 503
  • [5] Unified Implementation and Simplification for Task-Based Authorization Security in Workflows
    Zhong, Wenjing
    Zhao, Jinjing
    Hu, Hesuan
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3796 - 3811
  • [6] Knowledge Based Security Model for Banking in Cloud
    Auxilia, M.
    Raja, K.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATICS AND ANALYTICS (ICIA' 16), 2016,
  • [7] Model based HMI specification in an automotive context
    Fleischmann, Thomas
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: METHODS, TECHNIQUES AND TOOLS IN INFORMATION DESIGN, PT 1, PROCEEDINGS, 2007, 4557 : 31 - 39
  • [8] Matrix based Design of the Current Source Inverter with FPGA based implementation
    Polic, A.
    Curkovic, M.
    Jezernik, K.
    IECON 2004: 30TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOL 2, 2004, : 1640 - 1645
  • [9] An Immunology-Based Security System Model for Authorization
    Liu, Tong
    Wang, Yazhe
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1033 - 1037
  • [10] A security based model for mobile agent software systems
    Xu, HP
    Zhang, ZG
    Shatz, SM
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2005, 15 (04) : 719 - 746