Design and Implementation of a Context-Based Security Model

被引:0
|
作者
Iijima, Tadashi [1 ]
Kido, Satoshi [1 ]
机构
[1] Keio Univ, Fac Sci & Technol, Tokyo 108, Japan
来源
KNOWLEDGE-BASED SOFTWARE ENGINEERING, JCKBSE 2014 | 2014年 / 466卷
关键词
Access Control Model; Context Sensibility; XACML; Domain Specific Language; PETRI NETS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a context-based security model and describes one of the design and implementation of enforcement mechanism of it. In this access control model, a kind of object-oriented petri-net with nets-within-nets semantics is adopted as a context representation. This approach is, particularly, expected to be suitable for dynamic access control within inter-organizational business processes. The overall architecture of the access control model is designed by extending XACML standard architecture. And a Scala-based internal Domain Specific Language is designed to specify security policies.
引用
收藏
页码:356 / 370
页数:15
相关论文
共 50 条
  • [41] Formalizing a Workflow-Net Implementation of Design-Structure-Matrix-Based Process Planning for New Product Development
    Karniel, Arie
    Reich, Yoram
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2011, 41 (03): : 476 - 491
  • [42] Modular design and implementation of a logic control system for a batch process
    Ferrarini, L
    Piroddi, L
    COMPUTERS & CHEMICAL ENGINEERING, 2003, 27 (07) : 983 - 996
  • [43] Research and Implementation of Access Control Model of Internet of Things
    Lei, Wang
    Xu, Liutong
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 102 - 106
  • [44] Usable security - challenges and model for e-commerce systems
    Markotten, DGT
    Kaiser, J
    WIRTSCHAFTSINFORMATIK, 2000, 42 (06): : 531 - +
  • [45] Secure Development Strategy Model Framework for Security of Mobile Applications
    Poniszewska-Maranda, Aneta
    Chomatek, Lukasz
    Ochelska-Mierzejewska, Joanna
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1294 - 1299
  • [46] Job-centric security model for open collaborative environment
    Demchenko, Y
    de Laat, C
    Tokmakoff, A
    2005 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS, PROCEEDINGS, 2005, : 69 - 77
  • [47] A Petri net based supervisory control implementation
    Flochová, J
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 1039 - 1044
  • [48] On the Implementation of Industrial Automation Systems Based on PLC
    Basile, Francesco
    Chiacchio, Pasquale
    Gerbasio, Diego
    IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2013, 10 (04) : 990 - 1003
  • [49] A model-driven approach for quality of context in pervasive systems
    Hoyos, Jose R.
    Garcia-Molina, Jesus
    Botia, Juan A.
    Preuveneers, Davy
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 55 : 39 - 58
  • [50] A Graphical and Executable Model for Production Simulation in the Context of Industry 5.0
    Fernandes, Nuno
    Barros, Joao Paulo
    Campos-Rebelo, Rogerio
    2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 233 - 238