Task-Role Based Dual System Access Control Model
|
|
|
- Norman Waters
- 10 years ago
- Views:
Transcription
1 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July Task-Role Based Dual System Access Control Model Cui-xiao ZHANG, Ying-xin HU,Guo-bing ZHANG Computer Department, Shijiazhuang Railway Institute, Shijiazhuang , P.R.China Summary Combining role-based access control model and task based access control model, this paper puts forward a new task-role based access control model. Task is core in this model, task associates role and permission. It realizes permission dynamic management. This paper also gives the formal description of this model, and gives application example. Key words: Access Control; Task; WorkFlow; TRBAC 1. Introduction Along with popularization of computer applications, more and more enterprises sets up own information system. More important information need be transmitted through network. So, how to insure the information not be filched and not be juggled become hot research point of the current computer technique and network safe technique. International Standard Organization ISO defines five level safety services: identity authentication service, access control service, data secrecy service, data integrality service and undeniable service. Access control is an important component. Access Control is to allow or limit the ability and range of main body to access object by some means. By limiting the interview to the key resources, prevent the illegal customer from intruding or resulting in of break because the immodesty of the legal customer operation, thus guaranteeing that the system resources is subjected to control and use legally. The aim of access control is to limit the behavior and operation of system user. The current research heat of access control is mainly concentrated to Role-Based Access Control (RBAC) and Task-Based Access Control(TBAC). These two methods have the characteristics and limit singly. This paper analyzes the characteristics of these two methods first, then puts forward a new kind of dual system access control mechanism that combines the task and role, and gives application example. 2. Role-Based Access Control & Task-Based Access Control 2.1 Role-Based Access Control (RBAC) Model The main idea of RBAC is role, the safe manager defines various roles according to the demand, and assign appropriate permission to roles, user is assigned role of its responsibility according to different post. Thus,access control is divided into two parts, that is access permission is associated to role, role is associated to user, realize logical separation of user and access permission. The policy based role brings convenience to permission management. For example if position of a user changes, We just take off its current role, join new role which stands for its new position. Study show, the variety between role/perimission is more slower than variety between the role/user, and appoint the user to role doesn t need a lot of techniques, which administration manager can complete, but appoint permission to role is more complicated, need the certain technique, can be undertake by the specialized technical personnel, but don't appoint the permission of the user for them, this is in accordance with the circumstance in the actuality. Except convenient to permission management, Role-based access control can describe the role hierarchy primely, realize the principle of least permission and principle of separation of responsibility.
2 212 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July Task-Based Access Control model (TBAC) TBAC resolves the safe problem from the application and the business enterprise position. Task is its core, the access permission control is not static and invariable, it can change along with context of task, it provides dynamic, real-time safe management during task processing. TBAC model can be expressed by five tuple (S,O,P, L,AS) generally, among them, S means the body, O means object, P means permission, L means the life period, AS means that the authorization step. Because task has time limitation, so in task-based access control model user uses their permission has time limitation too. Therefore, if P is the permission which the AS activate, then L is the survival term of AS. Before AS is activated, its permission can not be used. When AS is triggered, its user starts own its permission, its life expects to start pour to account the hour at the same time. TBAC access strategy and its internal module relations generally is installed by system manager directly. By dynamic management of authorization step, TBAC supports least privilege policy and least reveal policy. When running task, user just be assigned permission needed, when task is not running or ended, user don t own assigned permission. In actual application, we usually need RBAC and TBAC at the same time. For example, position (role)of somebody maybe change, its function(permission) changed too, this is the characteristic of RBAC. But when this person carries out a certain concrete task, the programming and sub-task of the workflow involves carry out the demarcation of the order of task sequence match TBAC.RBAC lack the concept of workflow, just combining TBAC, it can solve the problem of sequence and relationship of sub-tasks during task running. The TRBAC(Task-Role-Based Access Control) model that puts forward below combine RBAC and TBAC, authorization is divided into the static authorization and the dynamic authorization, the static authorization connects role, the dynamic authorization connects task. It carrys out two organic combine, include both advantages, raised the vivid consumedly. 3 Task Role Based Access Control model (TRBAC) The main idea of TRBAC is to withdraw the task and role to be two basic characteristics. It appoints task to role, then appoints permission to task. The purpose of connection of permission and task is to realize permission dynamic management, but the purpose of role and task connection is to carry out of related information between task and object. When the permission of role updates, using task as resonance is convenient for role management. 3.1 Basic Concepts (1) Task: Task is logic unit of workflow. It can have correlation to many users,can include many sub-tasks. (2) Task instance: Task instance is a dynamic concept.it is the solid example of running task. (3) Authorization Step: It Means an original authorization processing step, meaning a process procedure to object in work flow. (4) Dependence: Dependence means correlation between tasks. It includes sequence dependence, failure dependence, agent dependence and so on.the dependence is a dynamic leash. Dependence reflect the principle to take task as the access control center. (5) Role: Role means the performance some one qualifications of the task, body now a certain right and responsibility. In a word, the business process of a workflow is made up of some tasks which have dependence to each other, each task is carry out by some roles, only When the dependence between task satisfy, the role of the task then can acquire the homologous permission to carry out the task.
3 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July TRBAC Formal Description TRBAC Model Figure 1 describes the component and relationship of component of TRBAC model. In TRBAC model, role is appointed to user, user acquire task to carry out by role, and own its permission when execute task. (Define 5) Session( S):The Session is mapping of user to role. When user activate role, user set up a session,user can activate multi-roles.a session can map to a user, a Session can map to multi-role.expressed as U:S U,R:S 2 R. (Define 6) a task is made up of three parts,that is beginning condition, performance information and end condition. (1) Beginning condition: Before the activity start, beginning condition must be checked, only the beginning condition is all satisfied, then that activity can start. (2 Performance information:it is the core of the activity, explaining the mission to complete by whom, time limit and handle way of timeout. (3) End condition:after activity start, the system starts to search the end condition of that activity every some minute, to make sure whether it complete or not. Figure 1 TRBAC model Formal description (Define 1) User(U):The user usually means employee gather.u={u 1,u 2,u 3,,u n }. (Define 2) Role(R):The role is to link user and task, the role is different from employee position in the company organization or responsibilities. R={r 1,r 2,r 3, r n }. (Define 3) Task(T):The task is an indivisible minimum performance unit. (Define 4) Permission(P):The permission is an abstraction set that has some operations to the some object. The permission of Not WorkFlow(NWF) task is the set of executive permission task need; the permission of WorkFlow(WF) task is set of active permission which trigged by task needed. The active permission set of current task is the executive permission set of next task.p={p 1,p 2,p 3, p n }. (Attribute 1): User-Role Assignment(URA):The URA is duality relationship of U and R. A user can have multi-roles, a role can be assigned to multi-users.the relationship between user and role is many-many. expressed as URA U T. (Attribute 2): Task-Role Assignment(TRA):The TRA is duality relationship of T and R..A task can be assigned to multi-roles,a role can carry out multi-tasks.the relationship between task and role is many-many. expressed as TRA T R.. (Attribute 3): Permission-Task Assignmeng (PTA):Carrying out the task demands permission, the PTA is duality relationship of P and T. expressed as PTA P T. Attribute 4:Business Procedure( BP):It Can be seen as running task set.bp={t 1,T 2,T 3, T n }
4 214 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 (Attribute 5) Role Hierarchylayer(RH): The RH R R, is an partial ordering relation, expressed as, it means grade relation between roles within organizes. countersign the quotation, fill in to deliver the invoice, fill in the work daily record, search all informations, search the area information, fill in to accept the payment list, fill in form of deliver from godown} 4. Application example We will explains the operation appearance of that model with the following order processing flow. Figure 2 is the processing flow of order 4.2 The flow element relationship URA={(u1,r1),( u2,r2),( u3,r3),( u4,r4),( u5,r5), ( u6,r6),( u7,r7),( u8,r8)} TRA={(t1,r1), (t2,r2), (t3,r2), (t4,r3), (t5,r4), (t6,r5), (t7,r6), (t8,r7), (t9,r8)} PTA={(p1,t1), (p2,t2), (p3,t3), (p4,t4), (p5,t5), (p6,t6), (p7,t7), (p8,t8), (p9,t9)} 4.3 Application example The active access control application The task t1, t2, t3, t4, t5, t8, t9 constitutes the workflow. The processing flow is following: Figure 2 processing flow of order 4.1 The flow element description U={ user 1, user 2, user 3, user 4, user 5, user 6, user 7, user 8} R={order member, sales department employee, Transportation Department employee, service department employee, service department engineer, general manager, area manager, finance department, supplies department} T={ accept order, verify order, merchandise quote, deliver goods, adjust and install, all information search, area information search, accept the payment, deliver from godown} P={ write customer's need, fill in the order, (1) User 1 served as the order member accept customer's order, write customer's need, the task's processing complete, then activate the next task to fill in the order or quote, that task is completed by user 2, if customer doesn t agree the quote, quote task need be executed repeatedly until customer's satisfied or the work flows the be over. (2) If the payment exceed the time limit non-arrival, that the work flows to carry out the failure dependence, changing direction that customer workflow be over. If the payment arrive, carrying out the in proper sequence dependence, user 8 is responsible to register information of delivering from godown, then transportation Department user 3 performances deliver the goods task, filling in to deliver the invoice. (3) Only task of delivering the goods is over, activate the "install" task, engineer's user 4 then can adjust to try to install the merchandise and fill in the work daily record, otherwise engineer's user 4 although
5 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July have the permission of the performance" install", before task is activated, that permission is invalid. The characteristics of permission is valid along with the task activate, invalid along with the end of task is suited for each task of the active access control The Passive Access Control Application The information search task is belongs to NWF, practicing the passive access control. Area manager user 6 own the permission of area information search, He can search area information at any time. Same, general manager user 5 can at any time search all information, including the area information. Design & Computer Graphics,2002,14(4): [6] R Sandhu,E J Conyne,H Lfeinstein,et al.role-based Access Control Models[J]. IEEE Computer, 1996,29(2): Cui-xiao ZHANG received the M.E. degrees, from Northeast Univ. in After working as a research assistant (from 1994), an instructor(from 1996),an assistant professor (since 2001) in the Dept. of Computer,Shijiazhuang Railway Institute. Her research interest includes computer network, information system, and their application. She is master tutor since Conclusion Safe access control is very important for the large and complicated workflow application. This paper introduces a new kind of access control method, that is Task Role-Based Access Control model(trbac).the TRBAC can integrate the actual work flow and relation which access control needed together, combine advantage of RBAC and TBAC. It can express control mechanism of complicated workflow clearly. Ying-xin HU received the B.E. degrees, from Shijiazhuang Railway Institute in Her research interest includes computer network, information system and their application. References: [1] Deng-shi LI.Access Control Policy in Workflow[J]. Journal JIANGHAN Unversity. 005:(3) [2] Ji-bo DENG,Fan HONG.Task-Based Access Control Model[J].Journal of software,2003,14:(1)76-82 [3] Ting-ting LIU,Hui-fen WANG,You-liang ZHAN G. Authorization Support Role-Based Access Control Model and Its Implementation[J],Journal of Computer-Aided Design &Computer Grapgics.2004,16(4): [4] Ferraiolo D,Sandhu R.Proposed NIST standard for role-based access control[j].acm Transactions on Information and System Security,2001,4(3): [5] Han Weili.Role-based constrained access control model and implement supported by constraints among permissions[j].journal of Compuer-Aided Guo-bing ZHANG Received the B.E. degrees, from Northeast Univ. in 1993.In 1993 he begins to woek. Since 2005 He works as senior engineer. His research interest includes computer network and computer maintenance.
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
An Improved Administration Method on Role-Based Access Control in the Enterprise Environment
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 921-944 (2001) An Improved Administration Method on Role-Based Access Control in the Enterprise Environment SEJONG OH AND SEOG PARK * Department of Computer
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Ensuring Access Control in Cloud Provisioned Healthcare Systems
Ensuring Access Control in Cloud Provisioned Healthcare Systems Hema Andal Jayaprakash Narayanan Department of Computer Science and Engineering University of Nevada, Reno Abstract An important issues in
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Access Control of Cloud Service Based on UCON
Access Control of Cloud Service Based on UCON Chen Danwei, Huang Xiuli, and Ren Xunyi Nanjing University of posts & Telecommunications, New Model Street No.66, 210003, Nanjing, China [email protected],
Feature. Multiagent Model for System User Access Rights Audit
Feature Christopher A. Moturi is the head of School of Computing and Informatics at the University of Nairobi (Kenya) and has more than 20 years of experience teaching and researching on databases and
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Workflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements
Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements
Components- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
Research on Mobile E-business Security Model based on WPKI Technology and its Application
, pp.119-128 http://dx.doi.org/10.14257/ijsia.2015.9.7.11 Research on Mobile E-business Security Model based on WPKI Technology and its Application Yongsheng Luo Department of Electronic and Information
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad, Jonathan Moffett and Jeremy Jacob EMail: {andreas, jdm, jeremy}@cs.york.ac.uk Department of Computer
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments
A Design of Onto-ACM(Ontology based Access Control Model) in Cloud Computing Environments Chang Choi Chosun University Gwangju, Republic of Korea [email protected] Junho Choi Chosun University Gwangju,
DATABASE DESIGN. - Developing database and information systems is performed using a development lifecycle, which consists of a series of steps.
DATABASE DESIGN - The ability to design databases and associated applications is critical to the success of the modern enterprise. - Database design requires understanding both the operational and business
Research and Practice of DataRBAC-based Big Data Privacy Protection
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 669-673 669 Open Access Research and Practice of DataRBAC-based Big Data Privacy Protection Huang
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
A logical approach to role-based access control in a distributed environment
A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
A GTRBAC Based System for Dynamic Workflow Composition and Management
A GTRBAC Based System for Dynamic Workflow Composition and Management Basit Shafiq, Arjmand Samuel, and Halima Ghafoor Purdue University {shafiq, amsamuel}@ecn.purdue.edu Abstract In this paper, we propose
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
4.1 The property and any copyright or other intellectual property rights in any Input Material shall belong to the Subscriber.
1 Interpretation 1.1 In these Conditions: THE SERVICE PROVIDER means Cutec Remote Backup Terms and Conditions THE SERVICE PROVIDER S STANDARD CHARGES means the charges shown in the Order Sheet or other
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad Department of Computer Science University of York York, YO10 5DD, UK [email protected] Jonathan Moffett
Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014
Introduction to Identity and Access Management for the engineers Radovan Semančík April 2014 How it works now? Manager Admin Login Users Login Admin Login Login Login Theory Manager Admin Forgot password
Best Practice exensys Asset Purchases
Best Practice exensys Asset Purchases Table of Contents Introduction:... 3 Overview:... 3 Benefits:... 4 Conclusion:... 4 Introduction: Accounting of fixed assets is a complex task. To effectively manage
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Copyright 2005-2010 Soleran, Inc. esalestrack On-Demand CRM. Trademarks and all rights reserved. esalestrack is a Soleran product Privacy Statement
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Jonathan D. Moffett Department of Computer Science University of York York, United Kingdom
To appear at ACM SACMAT 2002 A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions (2) Andreas Schaad Department of Computer Science University of York York, United
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
HL7 Role-based Access Control (RBAC) Role Engineering Process - Applied Example. Version 1.1. HL7 Security Technical Committee
HL7 Role-based Access Control (RBAC) Role Engineering Process - Applied Example Version 1.1 HL7 Security Technical Committee Table of Contents Section Page 1 APPLIED EXAMPLE...1 2 IDENTIFY AND MODEL USAGE
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
How To Model Access Control Models In Cse543
CSE543 - Introduction to Computer and Network Security Module: Access Control Models Professor Patrick McDaniel Fall 2008 1 Access Control Models What language should I use to express policy? Access Control
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW
CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University
User Manual CN2HK LIMITED. Complete Wireless Home Alarm Security System (CK-8806) ENG. Please read this manual before operating this product.
CN2HK LIMITED Complete Wireless Home Alarm Security System (CK-8806) User Manual Please read this manual before operating this product. After you finish reading this manual, store it in a safe place for
WHITE PAPER. Media Planning and Collaboration Platform
WHITE PAPER Media Planning and Collaboration Platform Summary The Mindtree Media Planning and Collaborative Platform [MPCP] is a transformational initiative for the advertising industry. It attempts to
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Ch.5 Database Security. Ch.5 Database Security Review
User Authentication Access Control Database Security Ch.5 Database Security Hw_Ch3, due today Hw_Ch4, due on 2/23 Review Questions: 4.1, 4.3, 4.6, 4.10 Problems: 4.5, 4.7, 4.8 How about the pace of the
Security Model Based on Network Business Security
Security Model Based on Network Business Security Wu Kehe, Zhang Tong, Li Wei, Ma Gang Department of Computer Science and Technology North China Electric Power University Beijing, China Abstract Enterprise
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Analyzing and Managing Role-Based Access Control Policies
1 Analyzing and Managing Role-Based Access Control Policies Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, and Martin Gogolla Abstract Today more and more security-relevant data is stored on computer
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Securing Service-Oriented Systems Using State-Based XML Firewall *
Securing Service-Oriented Systems Using State-Based XML Firewall * Abhinay Reddyreddy and Haiping Xu Computer and Information Science Department University of Massachusetts Dartmouth North Dartmouth, MA
Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
International Journal of Computer Applications in Engineering Sciences [VOL III, ISSUE II, JUNE 2013] [ISSN: 2231-4946] Strategic Role Engineering Approach to Visual Role Based Access Control (V-RBAC)
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving Alessandro Armando 1,2 and Silvio Ranise 2, 1 DIST, Università degli Studi di Genova, Italia 2 Security
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization 4.1 Understanding the organization and its context
ALICT Accreditation and. Certification
Accreditation: ALICT Accreditation and - GESCI DCU MoU Certification - Quality assurance of course by reputable international university - Recognition of course at post-graduate level (level 9) - Successful
CSE543 - Introduction to Computer and Network Security. Module: Access Control
CSE543 - Introduction to Computer and Network Security Module: Access Control Professor Trent Jaeger 1 Policy A policy specifies the rules of security Some statement of secure procedure or configuration
PROCEDURE. Part 5.9: Settlement Payment Methods and Schedule PUBLIC. Market Manual 5: Settlements. Issue 17.0 MDP_PRO_0036
PUBLIC MDP_PRO_0036 PROCEDURE Market Manual 5: Settlements Part 5.9: Settlement Payment Methods and Schedule Issue 17.0 This procedure describes the activities and schedule required by the IESO and Market
Week 3. COM1030. Requirements Elicitation techniques. 1. Researching the business background
Aims of the lecture: 1. Introduce the issue of a systems requirements. 2. Discuss problems in establishing requirements of a system. 3. Consider some practical methods of doing this. 4. Relate the material
AUTHENTICATION AND ACCESS CONTROL BEST PRACTICES FOR HEALTHCARE SYSTEMS
AUTHENTICATION AND ACCESS CONTROL BEST PRACTICES FOR HEALTHCARE SYSTEMS Lamaris Davis ICTN6865 East Carolina University Abstract Securing EHR s continue to be a huge problem for all health care organizations.
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
Using UML Part Two Behavioral Modeling Diagrams
UML Tutorials Using UML Part Two Behavioral Modeling Diagrams by Sparx Systems All material Sparx Systems 2007 Sparx Systems 2007 Page 1 Trademarks Object Management Group, OMG, Unified Modeling Language,
Developing a Service Oriented Process Management System for University Quality Assurance
Developing a Service Oriented Process Management System for University Quality Assurance PROF. DR. TAHER TAWFEK HAMZA Dept. of computer science, faculty of computer science and informatics, mansoura university,
... ... www.tracker-rms.com +44 (0) 8451 262 300 [email protected] CRM
.. TrackerRMS Customer relationship management The foundation component of TrackerRMS offers an all-in-one solution that can be applied to any type of business that require a mechanism for tracking customer
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
Agent-based University Library System
_ Course Number: SENG 609.22 Session: Fall, 2004 Course Name: Agent-based Software Engineering Department: Electrical and Computer Engineering Document Type: Project Report Agent-based University Library
Learning paths in open source e-learning environments
Learning paths in open source e-learning environments D.Tuparova *,1, G.Tuparov 1,2 1 Dept. of Informatics, South West University, 66 Ivan Michailov Str., 2700 Blagoevgrad, Bulgaria 2 Dept. of Software
5 Steps To Successful ERP Implementation
By Sean W. O Donnell, President, Datacor, Inc. Introduction Tougher competition in the marketplace is generating the need to better optimize resources, improve profitability and keep customers satisfied.
4.4 What is a Requirement? 4.5 Types of Requirements. Functional Requirements
4.4 What is a Requirement? It is a statement describing either 1) an aspect of what the proposed system must do, or 2) a constraint on the system s development. In either case it must contribute in some
The Economic Impact of Role-Based Access Control
The Economic Impact of Role-Based Access Control Final Report SUBMITTED TO: Gregory Tassey, Ph.D. National Institute of Standards and Technology Acquisition and Assistance Division Building 101, Room A1000
Things You Need in AP Automation
Things You Need in AP Automation ME LIKE! Let s Start! Accounts payable processing has long been one of the most document- and laborintensive operations a company undertakes. It s riddled with manual data
QUALITY MANUAL ISO 9001:2015
Page 1 of 22 QUALITY MANUAL ISO 9001:2015 Quality Management System Page 1 of 22 Page 2 of 22 Sean Duclos Owner Revision History Date Change Notice Change Description 11/02/2015 1001 Original Release to
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
Solving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
XACML Profile for Role Based Access Control (RBAC)
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 XACML Profile for Role Based Access Control (RBAC) Committee Draft 01, 13 February 2004 Document identifier: cs-xacml-rbac-profile-01 Location:
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
