A logical approach to role-based access control in a distributed environment
|
|
|
- Felicity Marian McCormick
- 10 years ago
- Views:
Transcription
1 A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008
2 Motivation Express access control policies in distributed systems. Take into consideration the RBAC structure with its extensions to include role hierarchy, delegation, separation of duties and obligations in a structured manner. Express the dynamic aspect of a policy (evolution in time)
3 Motivation Express access control policies in distributed systems. Take into consideration the RBAC structure with its extensions to include role hierarchy, delegation, separation of duties and obligations in a structured manner. Express the dynamic aspect of a policy (evolution in time) We present a language based on a set of rules (static rules and dynamic rules).
4 Outline
5
6 Description of the language Domain: D = S, R, A, O where S = set of subjects, R = set of roles, A = set of actions and O = set of objects. Security state: S = Ω, Π such that Ω Π with: O(s, r, a, o) Ω subject s has in S the obligation to execute action a on object o through role r P(s, r, a, o) Π subject s has in S the permission to execute action a on object o through role r
7 Static policy We define A formula φ := A φ φ where A is P(s, r, a, o) or O(s, r, a, o) A static clause based on D is an expression of the form A φ
8 Static policy We define A formula φ := A φ φ where A is P(s, r, a, o) or O(s, r, a, o) A static clause based on D is an expression of the form A φ Example P(x, user, read, file) P(x, user, write, file) x has the permissions to read the file through role user if he/she has the permission to write on the file through role user.
9 Definition A static policy SP is a finite set of static clauses based on D S = SP iff for all interpretations I for D and all static clauses A φ in SP, if S, I = φ then S, I = A.
10 Stateful security policies Problem: Starting from a security state S Some actions are permitted in S A user executes a subset A of these permitted actions These changes may affect the security state We have to specify these changes.
11 Dynamic clause A dynamic clause is an expression of the form: φ (ψ 1, ψ 2 ) where - φ, ψ 1 and ψ 2 are conjunctions of permissions and/or obligations
12 Dynamic clause A dynamic clause is an expression of the form: φ (ψ 1, ψ 2 ) where - φ, ψ 1 and ψ 2 are conjunctions of permissions and/or obligations Read: if all permissions/obligations in φ are true in S then if all the actions in φ are executed then ψ 1 will be true in the next state S else ψ 2 will be true in the next state S else the rule is not applied.
13 Definition An access control policy based on D is a tuple P = SP, DP Transition For all subsets A of Π we define the transition S A DP S iff for all I and all dynamic clauses φ (ψ 1, ψ 2 ) in DP, if S, I = φ then either A, A, I = φ and S, I = ψ 1 or A, A, I φ and S, I = ψ 2 S = SP
14 Example P(Mary, cardiologist, operate, patient) P(Mary, cardiologist, operate, patient) (O(Mary, cardiologist, follow up, patient), ) Mary has the permission to operate on a patient through role cardiologist (P(Mary, cardiologist, operate, patient) is in S) then
15 Example P(Mary, cardiologist, operate, patient) P(Mary, cardiologist, operate, patient) (O(Mary, cardiologist, follow up, patient), ) Mary has the permission to operate on a patient through role cardiologist (P(Mary, cardiologist, operate, patient) is in S) then if the action operate is executed Mary obtains the obligation to follow up on patient through role cardiologist (O(Mary, cardiologist, follow up, patient) true in S )
16 Example P(Mary, cardiologist, operate, patient) P(Mary, cardiologist, operate, patient) (O(Mary, cardiologist, follow up, patient), ) Mary has the permission to operate on a patient through role cardiologist (P(Mary, cardiologist, operate, patient) is in S) then if the action operate is executed Mary obtains the obligation to follow up on patient through role cardiologist (O(Mary, cardiologist, follow up, patient) true in S ) if this action is not executed nothing happens ( true in S ).
17
18 Role Activation User-role relations Permission-role relation Obligation-role relation
19 User-role relations Example To have the permission of playing a role: can play(s, r) can play(mary, Doctor) expresses that Mary has the permission to play the role doctor
20 User-role relations Example To have the permission of playing a role: can play(s, r) can play(mary, Doctor) expresses that Mary has the permission to play the role doctor Example To be active in a role: is active(s, r) can play(mary, Doctor) (is active(mary, Doctor), ) If Mary chooses to activate role Doctor, Mary becomes active as a doctor.
21 Permission-role and Obligation-role relations Acquire perm (s, r) assigns the permissions for the role r to a subject s. Acquire obl (s, r) assigns obligations for the role r to a subject s.
22 Example Acquire perm (x, Doctor) is active(x, Doctor) Acquire obl (x, Doctor) is active(x, Doctor)
23 Example Acquire perm (x, Doctor) is active(x, Doctor) Acquire obl (x, Doctor) is active(x, Doctor) Permission and obligation acquisition P(x, Doctor, a, o) Acquire perm (x, Doctor) O(x, Doctor, a, o) Acquire obl (x, Doctor)
24 Role Hierarchy In RBAC A role is a set of permissions associated with a set of users A role hierarchy is such that a subject acquires permissions to a role r if: the subject is a member of role r, or the role r is junior to the subject s role.
25 Role Hierarchy In RBAC A role is a set of permissions associated with a set of users A role hierarchy is such that a subject acquires permissions to a role r if: the subject is a member of role r, or the role r is junior to the subject s role. In our model: A role is a set of permissions and obligations associated with a set of users Two hierarchies (permissions and obligations)
26 Hierarchy relative to permissions A cardiologist is likely to inherit the permissions for the role doctor but less likely to inherit the obligations for the role doctor.
27 Hierarchy relative to permissions A cardiologist is likely to inherit the permissions for the role doctor but less likely to inherit the obligations for the role doctor. We define an order on roles relative to permissions Definition r 2 < perm r 1 says that role r 1 can inherit the permissions associated with role r 2.
28 Example Rules is active(mary, cardiologist) doctor < perm cardiologist intern < perm doctor Acquire perm (x, r 1 ) Acquire perm (x, r 2 ) (r 1 < perm r 2 )
29 Example Rules is active(mary, cardiologist) doctor < perm cardiologist intern < perm doctor Acquire perm (x, r 1 ) Acquire perm (x, r 2 ) (r 1 < perm r 2 ) Consequences: Acquire perm (Mary, cardiologist) Acquire perm (Mary, doctor) Acquire perm (Mary, intern)
30 Delegation Definition Executing an action by delegation is to execute it on one s behalf. Two types of delegation Allowing an entity to be delegatee of a role by action p delegate Forcing an entity to be delegatee of a role by action o delegate
31 We suppose: P(x, r, p delegate, y) Acquire perm (x, r 1 ) can play(y, r 2 )
32 We suppose: P(x, r, p delegate, y) Acquire perm (x, r 1 ) can play(y, r 2 ) Example P(x, pers assistant, p delegate, y) Acquire perm (x, cardiologist) can play(y, intern)
33 We suppose: P(x, r, p delegate, y) Acquire perm (x, r 1 ) can play(y, r 2 ) Example P(x, pers assistant, p delegate, y) Acquire perm (x, cardiologist) can play(y, intern) Mary is a cardiologist, she has the permission to delegate the role personal assistant to an intern. Mary s personal assistant is sick and she wishes to delegate this role to the intern John
34 Delegating a role P(Mary, pers assistant, p delegate, John) (P(John, pers assistant, d play, John), )
35 Delegating a role P(Mary, pers assistant, p delegate, John) (P(John, pers assistant, d play, John), ) When Mary executes the action p delegate John acquires the permission P(John, pers assistant, d play, John)
36 Delegating a role P(Mary, pers assistant, p delegate, John) (P(John, pers assistant, d play, John), ) When Mary executes the action p delegate John acquires the permission P(John, pers assistant, d play, John) P(John, pers assistant, d play, John) (is active(john, pers assistant) O(John, pers assistant, write, report), ) If John accepts the delegated role then he will be active in the role personal assistant but he will have an additional obligation to write a report on his work.
37 Delegation revocation Mary s personal assistant recovers from his sickness Mary stops the delegation by choosing not to execute the action p delegate John loses all the privileges of the delegates role at the next state.
38 Conclusion Relations of core RBAC can be encoded We can express hierarchies (for permissions and obligations) Delegation: we can dynamically alter the role inheritance relation and the user-role assignment. We can also express static and dynamic separation of duty and synchronization of actions.
39
40 Example The information in the client information file cannot be accessed without the client authorization. The client can grant authorization to a file that he/she owns. A clerk is responsible for receiving and identifying the client. A clerk can modify data in the client information file if he/she has access to the file.
41 Views and Context The need to add new entities: Add the entity View: The View is an entity that gathers objects of the same type Views are used to express a policy on objects that share the same characteristics. Example: A file John info.doc is an object in the View file. Is a(john info.doc, file)
42 Add the entity Context: The context describes the constraints or relations between the subject, action and object within a permission (or obligation) Example: Ownership is a context that associate the ownership of the object to the subject. Define(x, client, own, f, file, Ownership) name(x) = owner(f ) name is an attribute for the subject and owner is an attribute for the object.
43 Policy Define: A set of facts of the form P(r, a, v, c) A general rule perm(s, r, a, o, v, c) is active(s, r) is a(o, v) P(r, a, v, c) Define(s, r, a, o, v, c) Dynamic rules of the form φ (C 1, C 2 ) where φ is a conjunction of perm, or is active C 1 and C 2 are conjunctions of perm, is active, is a or
44 Example In static policy The permissions of executing an action by a role on a view are stated: P(client, send, signature, ownership) P(clerk, receive, signature, Access) P(clerk, access, file, Access) P(clerk, receive, signature, Access) P(clerk, modify, file, Access) P(clerk, access, file, Access) Define(s, r, a, o, v, Access) is active(x, client) name(x) = owner(o)
45 In dynamic policy The permissions of executing an action by a subject in a role on an object in a view are acquired perm(x, client, send, o, signature, ownership) (perm(y, pre clerk, receive, o, signature, Access), ) perm(y, post clerk, access, o, file, Access) perm(y, post clerk, modify, o, file, Access), )
46 Observations An action in a dynamic rule is executed by a subject on an object The execution of an action can lead to another permission
47 State transition: Modeling of a workflow
48 State transition: Modeling of a workflow Static rules P(R 1, move, step1, context) P(R 2, move, step2, context) P(R 1, move, step1, context) P(R 3, move, end, context) P(R 2, move, step2, context)
49 State transition: Modeling of a workflow Static rules P(R 1, move, step1, context) P(R 2, move, step2, context) P(R 1, move, step1, context) P(R 3, move, end, context) P(R 2, move, step2, context) Dynamic rules perm(s, R 1, move, t, step1, context) (is active(s, R 2 ) is a(t, step2), ) perm(s, R 2, move, t, step2, context) (is active(s, R 3 ) is a(t, end), )
50
51 Conclusion We described a language capable of expressing a policy that can evolve over time according to the actions performed by users We presented how we can express RBAC and its extensions into our language We gave example of an extension to a more complex environment involving views and contexts
52 Future work Test the expressive power of the language and possible extension via examining a case study Examine the notion of communication between roles Extend the language to support temporal constraints
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
On XACML, role-based access control, and health grids
On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving
Scalable Automated Symbolic Analysis of Administrative Role-Based Access Control Policies by SMT solving Alessandro Armando 1,2 and Silvio Ranise 2, 1 DIST, Università degli Studi di Genova, Italia 2 Security
Agile Software Development
Agile Software Development Lecturer: Raman Ramsin Lecture 13 Refactoring Part 3 1 Dealing with Generalization: Pull Up Constructor Body Pull Up Constructor Body You have constructors on subclasses with
CryptographicallyEnforced
Cryptographically CryptographicallyEnforced Enforced RBAC RBAC Georg Fuchsbauer (IST Austria) 27 June 2013, CSF joint work with Anna Lisa Ferrara and Bogdan Warinschi (University of Bristol) Overview Cryptographically
Security Analysis in Role-Based Access Control
Security Analysis in Role-Based Access Control NINGHUI LI Purdue University MAHESH V. TRIPUNITARA Motorola Labs The administration of large Role-Based Access Control (RBAC) systems is a challenging problem.
An Improved Administration Method on Role-Based Access Control in the Enterprise Environment
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 17, 921-944 (2001) An Improved Administration Method on Role-Based Access Control in the Enterprise Environment SEJONG OH AND SEOG PARK * Department of Computer
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Policy Analysis for Administrative Role Based Access Control
Policy Analysis for Administrative Role Based Access Control Amit Sasturkar Ping Yang Scott D. Stoller C.R. Ramakrishnan Department of Computer Science, Stony Brook University, Stony Brook, NY, 11794,
Access Control Basics. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Basics Murat Kantarcioglu Access Control - basic concepts An access control system regulates the operations that can be executed
Role based access control in a telecommunications operations and maintenance network
Final thesis Role based access control in a telecommunications operations and maintenance network Performed for Ericsson AB by Peter Gunnarsson LITH-IDA-EX 05/012 SE 2005-03-01 Final thesis Role based
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang
A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Ruben Wolf and Markus Schneider Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation (SIT)
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory
Controlling Database Access by Providing Access Permissions on Database Objects
International Journal of Scientific & Engineering Research, Volume 4, Issue 4, April-2013 1215 Controlling Database Access by Providing Access Permissions on Database Objects 1 Manushi Majumdar, 2 Anu
Copyright 2005-2010 Soleran, Inc. esalestrack On-Demand CRM. Trademarks and all rights reserved. esalestrack is a Soleran product Privacy Statement
CRM 2013 Workflows. Description
CRM 2013 Workflows What can Workflows do? In CRM 2013, there are four types of Processes that can be created. We are covering Workflows today, but here is a brief explanation of each type. Process category
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Risk-Aware Role-Based Access Control
Risk-Aware Role-Based Access Control Liang Chen Jason Crampton Information Security Group, Royal Holloway, University of London 7th International Workshop on Security and Trust Management Risk-Aware RBAC
Ensuring Access Control in Cloud Provisioned Healthcare Systems
Ensuring Access Control in Cloud Provisioned Healthcare Systems Hema Andal Jayaprakash Narayanan Department of Computer Science and Engineering University of Nevada, Reno Abstract An important issues in
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
Security Analysis in Role-Based Access Control
Security Analysis in Role-Based Access Control NINGHUI LI Purdue University and MAHESH V. TRIPUNITARA Motorola Labs The administration of large role-based access control (RBAC) systems is a challenging
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
Database Security and Authorization
Database Security and Authorization 1 Database Security and Authorization 1.1 Introduction to Database Security Issues 1.2 Types of Security 1.3 Database Security and DBA 1.4 Access Protection, User Accounts,
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Role-Based Access Control (RBAC)
CIS/CSE 785: Computer Security (Syracuse University) RBAC: 1 1 Motivation Role-Based Access Control (RBAC) With many capabilities and privileges in a system, it is difficult to manage them, such as assigning
Introduction to Computer Security
Introduction to Computer Security Access Control and Authorization Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access recapitulated 1. Identification Which object O requests
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform
PRODUCT DATASHEET Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform IT MANAGEMENT BENEFITS Get successful on time and budget Start with a tactical solution, build for tomorrow
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2
Role-Based Access Control Approaches In Mangodb 2.4 and Informix Online Dynamic Server Version 7.2 Abubakar Sulaiman Gezawa 1, Ahmed Aliyu 2, Tong Yujun 3, Saifullahi Aminu Bello 4, Abubakar Ado 5 System
Iterated Dynamic Belief Revision. Sonja Smets, University of Groningen. website: http://www.vub.ac.be/clwf/ss
LSE-Groningen Workshop I 1 Iterated Dynamic Belief Revision Sonja Smets, University of Groningen website: http://www.vub.ac.be/clwf/ss Joint work with Alexandru Baltag, COMLAB, Oxford University LSE-Groningen
Dynamically Authorized Role-Based Access Control for Secure Distributed Computation
Dynamically Authorized Role-Based Access Control for Secure Distributed Computation CORBA CSIv2 in Action C. Joncheng Kuo & Polar Humenn Center for Systems Assurance Syracuse University March 20, 2002
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
Analyzing and Managing Role-Based Access Control Policies
1 Analyzing and Managing Role-Based Access Control Policies Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, and Martin Gogolla Abstract Today more and more security-relevant data is stored on computer
High level conflict management strategies in advanced access control models
Replace this file with prentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home Page. High level conflict management strategies in advanced
Computer security Lecture 3. Access control
Computer security Lecture 3 Access control Access control, the basic problem: Efficient representation of access rights Simply listing, per subject and object, what access is allowed and/or denied is very
Database Security. The Need for Database Security
Database Security Public domain NASA image L-1957-00989 of people working with an IBM type 704 electronic data processing machine. 1 The Need for Database Security Because databases play such an important
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
Physical/Logical Access Interoperability Working Group
Physical/Logical Access Interoperability Working Group Contents Physical/Logical Access Interoperability... 2 Introduction... 2 Overview & Executive Summary... 3 Business Objective... 3 Technical Objective...
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification
Chapter 5 More SQL: Complex Queries, Triggers, Views, and Schema Modification Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 5 Outline More Complex SQL Retrieval Queries
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
Jonathan D. Moffett Department of Computer Science University of York York, United Kingdom
To appear at ACM SACMAT 2002 A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions (2) Andreas Schaad Department of Computer Science University of York York, United
Formal Verification and Linear-time Model Checking
Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Analyzing First-order Role Based Access Control
Analyzing First-order Role Based Access Control Carlos Cotrini, Thilo Weghorn, David Basin, and Manuel Clavel Department of Computer Science ETH Zurich, Switzerland {basin, ccarlos, thiloweghorn}@infethzch
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
A Delegation Framework for Federated Identity Management
A Framework for Federated Identity Management Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono and Satoru Fujita NEC Internet Systems Research Laboratories 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa
ITM661 Database Systems. Database Security and Administration
ITM661 Database Systems Database Security and Administration Outline Introduction to Database Security Issues Types of Security Threats to databases Database Security and DBA Access Protection, User Accounts,
Deploying and Managing a Public Key Infrastructure
Deploying and Managing a Public Key Infrastructure 2821: Deploying and Managing a Public Key Infrastructure (4 Days) About this Course This four-day, instructor-led course provides students with the knowledge
Automated Model-Based Testing of Role- Based Access Control Using Predicate/Transition Nets
IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of Role- Based Access Control Using Predicate/Transition Nets Dianxiang Xu, Michael Kent, Lijo Thomas, Tejeddine Mouelhi, Yves
Extended RBAC Based Design and Implementation for a Secure Data Warehouse
Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas [email protected] Srinivasan Iyer The University of Texas
develop privacy policies, and implement them with role-based or other access control mechanisms supported by EHR systems.
Basic Patient Privacy Consents (BPPC) provides a mechanism to record the patient privacy consent(s), a method to mark documents published to XDS with the patient privacy consent that was used to authorize
Cassandra. References:
Cassandra References: Becker, Moritz; Sewell, Peter. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. 2004. Li, Ninghui; Mitchell, John. Datalog with Constraints: A Foundation
The Phios Whole Product Solution Methodology
Phios Corporation White Paper The Phios Whole Product Solution Methodology Norm Kashdan Phios Chief Technology Officer 2010 Phios Corporation Page 1 1 Introduction The senior staff at Phios has several
Trust but Verify: Authorization for Web Services. The University of Vermont
Trust but Verify: Authorization for Web Services Christian Skalka X. Sean Wang The University of Vermont Trust but Verify (TbV) Reliable, practical authorization for web service invocation. Securing complex
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP [email protected]. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP [email protected] May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
Towards Securing APIs in Cloud Computing
Towards Securing APIs in Cloud Computing Kumar Gunjan #1, R. K. Tiwari *2, G. Sahoo #3 # Department of Information Technology, Birla Institute of Technology, Mesra Ranchi, India * RVS College of Engineering&
Task-Role Based Dual System Access Control Model
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.7B, July 2006 211 Task-Role Based Dual System Access Control Model Cui-xiao ZHANG, Ying-xin HU,Guo-bing ZHANG Computer Department,
An Application of Integrating Role and Lattice Based Access Control in Database Engineering
An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics
Fabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
Risk Management in Dynamic Role Based Access Control Systems
Risk Management in Dynamic Role Based Access Control Systems J. Ma, K. Adi, L. Logrippo, Serge Mankovski, Department of Computer Science and Engineering Université du Québec en Outaouais Québec, Canada.
Using Role-Based Access Control (RBAC) to Replace Traditional Oracle E-Business Suite Responsibility-Based Security
www.pwc.com/ca Using Role-Based Access Control (RBAC) to Replace Traditional Oracle E-Business Suite Responsibility-Based Security Riaz Rahaman Ravi Gaddam SO-OAUG, March 13, 2014 Agenda Traditional Responsibility
HL7 Role-based Access Control (RBAC) Role Engineering Process - Applied Example. Version 1.1. HL7 Security Technical Committee
HL7 Role-based Access Control (RBAC) Role Engineering Process - Applied Example Version 1.1 HL7 Security Technical Committee Table of Contents Section Page 1 APPLIED EXAMPLE...1 2 IDENTIFY AND MODEL USAGE
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Role Engineering: The Cornerstone of Role- Based Access Control DECEMBER 2009
WHITE PAPER: ROLE ENGINEERING AND ROLE-BASED ACCESS CONTROL Role Engineering: The Cornerstone of Role- Based Access Control DECEMBER 2009 Srinivasan Vanamali, CISA, CISSP CA SERVICES Table of Contents
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques
Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping Techniques Sean Thorpe 1, Indrajit Ray 2, and Tyrone Grandison 3 1 Faculty of Engineering and Computing,
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY
CHAPTER 2 DATABASE MANAGEMENT SYSTEM AND SECURITY 2.1 Introduction In this chapter, I am going to introduce Database Management Systems (DBMS) and the Structured Query Language (SQL), its syntax and usage.
Administering Active Directory. Administering Active Directory. Reading. Review: Organizational Units. Review: Domains. Review: Domain Trees
Reading Read over the Active Directory material in your Network+ Guide I will be providing important materials Administering Active Directory If you don t understand certain concepts, please ask for help!
Relational Calculus. Module 3, Lecture 2. Database Management Systems, R. Ramakrishnan 1
Relational Calculus Module 3, Lecture 2 Database Management Systems, R. Ramakrishnan 1 Relational Calculus Comes in two flavours: Tuple relational calculus (TRC) and Domain relational calculus (DRC). Calculus
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
The Role-Based Access Control System of a European Bank: A Case Study and Discussion Andreas Schaad, Jonathan Moffett and Jeremy Jacob EMail: {andreas, jdm, jeremy}@cs.york.ac.uk Department of Computer
