This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Xinyu WANG, Jianling SUN, Xiaohu YANG, Chao HUANG, Di WU, "Security Violation Detection for RBAC Based Interoperation in Distributed Environment" in IEICE TRANSACTIONS on Information,
vol. E91-D, no. 5, pp. 1447-1456, May 2008, doi: 10.1093/ietisy/e91-d.5.1447.
Abstract: This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.
URL: https://global.ieice.org/en_transactions/information/10.1093/ietisy/e91-d.5.1447/_p
Copy
@ARTICLE{e91-d_5_1447,
author={Xinyu WANG, Jianling SUN, Xiaohu YANG, Chao HUANG, Di WU, },
journal={IEICE TRANSACTIONS on Information},
title={Security Violation Detection for RBAC Based Interoperation in Distributed Environment},
year={2008},
volume={E91-D},
number={5},
pages={1447-1456},
abstract={This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.},
keywords={},
doi={10.1093/ietisy/e91-d.5.1447},
ISSN={1745-1361},
month={May},}
Copy
TY - JOUR
TI - Security Violation Detection for RBAC Based Interoperation in Distributed Environment
T2 - IEICE TRANSACTIONS on Information
SP - 1447
EP - 1456
AU - Xinyu WANG
AU - Jianling SUN
AU - Xiaohu YANG
AU - Chao HUANG
AU - Di WU
PY - 2008
DO - 10.1093/ietisy/e91-d.5.1447
JO - IEICE TRANSACTIONS on Information
SN - 1745-1361
VL - E91-D
IS - 5
JA - IEICE TRANSACTIONS on Information
Y1 - May 2008
AB - This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.
ER -