An Application of Integrating Role and Lattice Based Access Control in Database Engineering
|
|
|
- Quentin McLaughlin
- 10 years ago
- Views:
Transcription
1 An Application of Integrating Role and Lattice Based Access Control in Database Engineering Ioannis Mavridis 1, George Pangalos 2, Stavros Kortesis 2 and Isabella Kotini 3 1 Department of Applied Informatics University of Macedonia, Thessaloniki, Greece [email protected] 2 Informatics Laboratory, General Department, Faculty of Technology Aristotle University, Thessaloniki Greece {pangalos,stk}@auth.gr 3 Department of Electrical and Computer Engineering, Faculty of Technology Aristotle University, Thessaloniki Greece [email protected] Abstract. The development of a database access control system is usually accomplished during the earlier stages of the life-cycle of information systems. However, to follow up the evolution of information systems there is often a need to update their security mechanisms without having to reengineer them. The significant security administration workload involved in such a repetitive process can be reduced if an appropriate security model is used and is implemented according to a clearly defined methodology for naming, designing and constructing the components of the aimed access control system. In this paper, we present an application of a step-by-step methodology for engineering an access control system in the healthcare domain, which is based on the mechanisms provided by the already known emedac security model. The demonstrated application results in an easily updated access control system that is capable of providing fine-grained and multilevel access control at the same time. 1 Introduction In today s information systems incorporating security is a process that must be taken into account from the very first steps of the software development process. Security engineering involves the process of specifying the security requirements from application requirements and organizational policies, and subsequently designing the appropriate security mechanisms that are required for their realization. One of the principal security technologies is access control, which focuses on protecting resources (e.g. stored data) by restricting access to authorized users only with an appropriate access control system [1]. A typical access control system includes subjects, who access objects through operations [2, 3]. Functionally, it consists of a security policy and a set of authorization rules, that is information regulating the access modes to be followed by subjects upon access to objects. Moreover, it in-
2 243 volves a set of access control mechanisms that check the access requests against the authorization rules. Requests may then be allowed, denied or modified. The process of engineering an access control system results in a set of authorization rules that are implemented using properly configured access control mechanisms. This process must be accomplished during the design phase of development life-cycle of information system [4]. However, to follow up the evolution or to support the maintenance of existing information systems there is often a need to update their security mechanisms without having to reengineer them, especially in legacy information systems. Such a repetitive process of redefining the components of an access control system is difficult, entails a significant administrative workload, as well as a considerable possibility of human errors. Therefore it must be based on well-defined methods and guidelines for effective security requirements engineering. Moreover, becomes more obvious the need for a clearly defined engineering methodology for naming, designing and constructing the components of an access control system that implements an appropriate security model. Access control systems that provide access control mechanisms with both mandatory and discretionary features are particularly suitable in privacy critical environments, as for example the healthcare information systems [5]. Such an access control system could be implemented according to the already known emedac security model [6], which is based on the Bell-LaPadula model [7] and exploits the administrative advantages of RBAC components [8, 9]. EMEDAC provides advanced security characteristics since it enforces in a unified way permission-based and multilevel access control based on roles rather than on particular users. The advantages of emedac concern also providing authorization rules with fine-grained granularity and separating application from authorization logic, while configuring access control mechanisms using application-specific information but without affecting the design scheme of primary application data. In this paper, an application of a step-by-step methodology for engineering the mechanisms of an access control system conforming to the emedac security model, during or after the completion of the design phase of the initial development or any subsequent maintenance software life-cycle of a database system [10], is presented. In section 2, we give a brief overview of the emedac access control model. Then, we describe in section 3 the engineering methodology and in section 4 we present an application example in the healthcare domain. Our conclusions are given in section 5. 2 A Brief Overview of emedac According to emedac security model [6], a protected object is a data set, which can be a database, as a whole or a part of any size. Subjects (users) have a number of assigned roles, which are collections of permissions (privileges) to access objects. User roles are authorized to execute specific database operations on predefined sets of data on behalf of users that activate them. Data sets can be derived according to the fragmentation method [11], which is described later. The access window of a user role can be seen as the combination of a number of those data sets. For a more precise definition of the concept of a data set one can consider it as the largest area of the
3 244 database to which two or more user roles have accesses in common. On the other hand, there is no user role that has access only to a part of a specific data set. Each one data set is implemented as a view. Views, which can be defined with appropriate SELECT statements of SQL, provide a very powerful mechanism for controlling what information can be accessed [12]. As a result, instead of authorizing users to have access to the base relations of a database system, user roles are permitted to access only to view relations, which correspond to specific data sets. The main type of access control mechanisms used in emedac is called Hyper- Node Hierarchy (HNH). HNH is an abstraction and permission inheritance structure for constructing User Role Hierarchies (URH) and Data Set Hierarchies (DSH). In addition, HNHs are used for deriving security labels (that include a security level and a category set) of user roles and data sets in order to exercise multilevel access control. A HNH is actually a set of nodes and connections of different types (Figure 1). A node is characterized as either hyper or dummy. Nodes are connected to each other with either a branch or a link. A branch connects a node with its ancestor node, which has a different (higher) security level. Links connect between nodes of the same security level. A hyper node HN has a security level that is equal to the number of branches reached when moving upward in the hierarchy. The category set of a hyper node HN consists of all its possible first ancestors. A Level 5 hyper node B C E Level 4 Level 3 dummy node branch link F G H Level 2 I K L L Level 1 Fig. 1. The Hyper Node Hierarchy (HNH) The HNH mechanism can provide hierarchies of any depth, with derived security levels and categories. Access control metadata can be centrally defined and stored separately from the application data holders. A flexible number of refinement levels can be specified, which is not strictly equal to the number of mandatory security levels. However, the HNH mechanism specifies (in a mandatory way) a certain number of security levels that cannot be overridden (in fig.1 maximum number of levels is 5).
4 245 3 The Engineering Methodology The database access control engineering methodology consists of a number of steps that are presented briefly in the following subsections. 3.1 Step 1: Organizational Role Engineering First of all, the security designer works on a set of requirement specifications of a specific application to locate the organizational user roles [13]. These roles can be categorized according to the specified blocks of activities that characterize the type of the organization under consideration, providing so an initial URH. 3.2 Step 2: Security Requirements Derived from the High Level Security Policy Subsequently, the security designer works in the context of regulations that are in effect in the specific organization and in accordance to the overall high level security policy (HLSP) to specify the security requirements of the database system [14]. A critical starting point is the refinement of those regulations in order to produce a set of principles and guidelines that affect primarily the overall security of the organization and finally constitute the security requirements derived from the HLSP. 3.3 Step 3: Need-to-know Requirements of User Roles The need-to-know requirements of user roles are derived from the functional design specifications that have been produced by the application designers. For every single organizational user role, the security designer records the area of the database where it needs to have access in order to accomplish a number of assigned tasks. 3.4 Step 4: Final Set of Security Constraints The final set of security constraints is derived by combining the security requirements derived from the HLSP (step 2) and the need-to-know requirements of user roles (step 3). We distinguish between three different types of security constraints [11]: Simple constraints define vertical subsets of data tables to restrict users from accessing certain columns. Content-based constraints define horizontal subsets of data tables to express access restrictions based on the content of certain tuples. Complex constraints define horizontal subsets of data tables depending on the values of attributes of different tables, in order to express access restrictions that span several tables.
5 Step 5: Fragmentation of Data Scheme Based on the final set of security constraints and the already specified set of data tables, the security designer performs a fragmentation (structured decomposition) of the relational data scheme that results in a set of disjoint data sets, such that the access window of a given user role is not defined over a subset of a data set only. The resulting fragmentation schema can be considered as a DSH without classification levels. More specifically, each type of security constraint causes a corresponding operation of data fragmentation [11], as follows: Vertical fragmentation is the projection of the relational schema onto a subset of its attributes. It is caused by simple security constraints. Horizontal fragmentation is a subdivision (selection) of a relation into a subset of its tuples that is caused by content-based constraints. Derived-horizontal fragmentation is a subdivision (selection) of a relation into a subset of its tuples that is caused by complex constraints. 3.6 Step 6: Initial Permission Set At this point, two different types of mappings between user roles and data sets are defined: MRD : UR i {DS 1, DS 2,, DS j }, is a function mapping a user role UR to the group of data sets DS that has access, MDR : DS i {UR 1, UR 2,, UR j }, is a function mapping a data set DS to the group of user roles UR having access to this data set. The security designer transforms the final set of security constraints (step 4) to a set of MRDs (user role to data set mappings). Then, based on specified MRDs, the security designer constructs an initial permission set, which is actually a set of MDRs (data set to user role mappings) to express the access rights of user roles on data sets. 3.7 Step 7: Data Classification In order to assign appropriate classification levels and categories to data sets, an automated labeling process is performed, which is based on the assumption that a data set accessed by many user roles cannot contain sensitive information, whereas a data set accessed by few user roles only may have sensitive data [11]. Such a situation leads to the assignment of a low classification level to the former data set and a high classification level to the latter. Furthermore, we assume that a data set belongs to the same categories of the user role that needs to access it, as defined in the initial permission set (step 6). Based on the cardinality of particular MDRs (how many user roles have access to every data set), the Data Set Hierarchy of step 5 is redesigned by assigning classification levels to data sets. All the ancestral data sets, as well as the base data tables, are assigned the highest classification level of their child. Then, in order to overcome possible conflicts and to encompass content-based security features in the final access
6 247 control system, the security designer may perform a manual modification of the classification levels that have been assigned automatically. 3.8 Step 8: Refinement of User Roles Based on the set of MRDs defined in step 6, a new User Role Hierarchy (without clearance levels) is produced that includes, in addition to the nodes of organizational user roles and categories, a number of possible new logical user roles, which may result from the refinement of organizational user roles. 3.9 Step 9: Final Permission Set As a consequence of the refinement of the organizational user roles and the definition of new logical user roles, the initial permission set has to be reconstructed. In the final permission set, a number of new logical roles may replace the entries of some original organizational user roles that have been refined, providing so an adequate level of granularity for fine-grained access control Step 10: User Role Classification Finally, extending the automated labeling process for user roles, it is assumed that in order to have the ability to access a number of data sets (according to a particular MRD), a user role must be assigned a clearance level that is equal to the highest classification level of those data sets. As a result, according to the final versions of the permission set and the DSH, a final URH with clearance levels is constructed. C1 C2 Exams Diagnosis Doctor s Diagnosis Patient History C1 C2 C1 C2 Treat ment Prescription Editing Treatment Management C1 C2 Equipment Supplement Equipment required Special Doctor Physician Head Nurse Logistics Stuff Equipment covering Head Research Physician Doctor Doctor C1 C2 C3 Treatment delivery program C1 C2 C3 C1 C2 Treatment Management Treat ment delivered Treatment Billing Treat ment Bill Paramedical Stuff / Nurse Administration Stuff Fig. 2. The SADT diagram of the healthcare subsystem
7 248 4 Application Example in a Healthcare Subsystem In this section, an example from the healthcare domain is described to illustrate the application of the presented engineering methodology. More specifically, it concerns a part of a healthcare information system (HIS) for patient diagnosis, prescription editing and treatment. The entire experimental implementation has taken part in cooperation with a major Greek hospital and revealed the advantages of the proposed methodology in providing clearly defined steps for engineering an efficient and flexible access control system in healthcare environments. According to step 1, the specific functional specifications of the healthcare application subsystem are recorded in a SADT diagram [15], which includes block activities and involved organizational roles that perform those activities (Figure 2). User roles involved in the SADT diagram are then categorized, according to the general model of a HIS architecture that has been defined by the ISHTAR group ([16]), in five main categories of activities, which correspond to ward, medical, administration, logistics and other activities (Table 1). Categories User roles Medical (M) Head Doctor (HD), Special Doctor (SD), Physician (PH) Head Nurse (HN), Nurse Ward (W) (NU), Paramedical Staff (PS) Administration (A) Admin Staff (AS) Logistics (L) Logistics Staff (LS) Other (O) Research Doctor (RD) Table 1. User Role categories As a result, an initial User Role Hierarchy is constructed to represent the user roles that are included in each category, without specifying the clearance levels of the particular user roles, as shown in the following figure 3. All Users M W A L O HD SD PH HN NU PS AS LS RD Fig. 3. The initial URH
8 249 In the rest of this example we work only with user roles of categories Ward and Others, as well as with a part of the data relational schema that includes the following data tables: PAtient (PAcode, PAname, PAaddress, PAtelephone, PAsocialcode, PAsex, PAbirthday, PAbloodcode, PAvipflag) PRescription (PRcode, PRpacode, PRclinic, PRdoctor, PRdisease, PRdrug, PRdose, PRdatefrom, PRdateto, PRtype, PRdescription, PRcareinstruct) In step 2, a set of security requirements (principles and guidelines) for the specific healthcare institution is defined as follows: health care workers should have access to those medical data only that belong to patients they have a duty to care for. patients entrust physicians to protect their medical data and expect physicians and associated medical staff to protect their privacy rights. medical data may be accessed by public health officials and researchers for specific purposes only. personal data of patients characterized as VIPs (very important persons), may be accessed by the highest medical staff (e.g. head doctors) only. In step 3, the need-to-know requirements of user roles HN, NU, PS and RD are specified to concern both data tables PA and PR. Then, in step 4, the following set of security constraints is defined (Table 2). User Role HN RD NU PS Security Constraints on accessing parts of tables PA: personal data (name, address, telephone, socialcode) with PAvipflag='VIP' PR: column PRdisease PA: personal data of all patients, as well as all columns when PRdisease 'HIV' PR: PRdisease when PRdisease HIV PA: personal data, as well as all columns when PAvipflag = 'VIP' PR: all columns when PRtype 'nursing' PA: personal data, as well as all columns when PAvipflag = 'VIP' PR: all columns when PRtype 'therapy' Table 2. Security constraints of user roles In step 5, a fragmentation process is performed for each data table, based on the security constraints of particular user roles, as follows: User role HN causes a vertical fragmentation of table PA onto data sets (fragments) PA1 (columns with personal data) and PA2 (columns with no personal data), as well as a horizontal fragmentation of data set PA1 onto data sets PA11 (for PAvipflag='VIP') and PA12 (for Avipflag 'VIP'). User roles UN and PS cause a vertical fragmentation of data set PA2 onto data sets PA21 (for PAvipflag='VIP') and PA22 (for PAvipflag 'VIP'). User role RD causes a derived horizontal fragmentation of data sets PA21 and PA22 onto data sets PA211, PA212, PA221 and PA222, based on the evaluation of predicate PRdisease='HIV' defined on table PR.
9 250 User role HN causes a vertical fragmentation of table PR onto data sets PR1 (PRdisease) and PR2 (rest of columns). User role RD causes a horizontal fragmentation of data sets PR1 and PR2 onto data sets PR11, PR12, PR21 and PR22 based on the evaluation of predicate PRdisease='HIV'. User roles NU and PS cause a horizontal fragmentation of data sets PR11, PR12, PR21 and PR22 to PR111, PR121, PR211 and PR221 based on the evaluation of predicate PRtype= 'nursing', and PR112, PR122, PR212 and PR222 based on the evaluation of predicate PRtype= 'therapy', respectively. The resulting fragmentation schema is a Data Set Hierarchy without levels (Figure 4). All Data vertical fragmentation horizontal fragmentation derived horizontal fragmentation PA PR PA1 PA2 PR1 PR2 PA11 PA12 PA21 PA22 PR11 PR12 PR21 PR22 PA211 PA212 PA221 PA222 PR111 PR112 PR121 PR122 PR211 PR212 PR221 PR222 Fig. 4. The fragmentation schema In step 6, the mappings from user roles to data sets (Table 3) and an initial permission set (set of MDRs) are defined (Table 4). (user role) HN NU PS RD {data sets} {PA12, PA2, PR2} {PA22, PR111, PR121, PR211, PR221} {PA22, PR112, PR122, PR212, PR222} {PA211, PA221, PR1, PR21} Table 3. Mappings from user roles to data sets (MRDs) In step 7, the automatic assignment of classification levels to data sets according to mapping cardinalities is performed, as shown in table 5.
10 251 (data set) {user roles} PA11 {} PA12, PA212 {HN} PA211 {HN, RD} PA221 {HN, NU, PS, RD} PA222 {HN, NU, PS} PR111, {NU, RD} PR121 PR112, {PS, RD} PR122 PR211 {HN, NU, RD} PR212 {HN, PS, RD} PR221 {HN, NU} PR222 {HN, PS} Table 4. Mappings from data sets to user roles (MDRs) Data Sets Cardinality Level PA PA12, PA PA211, PR111, PR112, PR121, PR122, PR221, 2 3 PR222 PA222, PR211, PR PA Table 5. Automatic labeling of data sets Based on the above MDR mappings, the DSH is reconstructed, having now classification levels for data sets, as shown in figure 5. PA11 PA1 PA W O All Data Level 5 PA12 PA212 PA21 PA Level 4 PA PR121 PR122 PR111 PR112 PR12 PR11 PR1 PR221 PR222 PR22 PR2 PR Level 3 PA222 PA22 PR211 PR212 PR21 Level 2 PA221 Level 1 Fig. 5. The final DSH
11 252 In step 8, the security designer processes the above MRDs for each category and, according to the basic relationships of user roles, refines the organizational user roles NU and PS. The common parts (overlaps) of permissions of roles HN, NU and PS are represented in figure 6. The refinement of organizational user roles NU and PS results in five logical user roles: NU1, NU2, PS1, PS2 and NP3. ΗΝ NU2 NP3 PS1 ΝU NU1 PS2 PS Fig. 6. Role relationships As a result of the previous refinement, the security designer constructs an initial User Role Hierarchy (URH) without specifying any clearance levels (Figure 7). Senior (high level) user roles of the URH inherit permissions from their child nodes, e.g. user roles NU2 and PS1 inherit permissions from user role NP3. A ll U s e rs W O NU HN PS RD NU1 NU2 PS1 PS2 NP3 Fig. 7. URH without levels In step 9, the initial permission set (set of MDRs) is updated in order to replace organizational user roles NU and PS with the new logical roles NU1, NU2, PS1, PS2 and NP3 (Table 6). According to step 10, the automated labeling process is further applied to user roles and a new User Role Hierarchy (final URH) with clearance levels is produced, as shown in Figure 8.
12 253 (data set) PA12, PA212 PA211 PA221 PA222 PR111, PR121 PR112, PR122 PR211, PR221 PR212, PR222 {roles} {HN} {HN, RD} {NP3, RD} {NP3} {NU1, RD} {PS1, RD} {NU2, RD} {PS2, RD} Table 6. Final permission set HN W Level 4 All Users NU1 NU NU2 PS1 PS PS2 RD O Level 3 Level 2 NP3. Fig. 8. The final URH The application of the proposed methodology, as demonstrated in this implementation example, results in an access control system that consists of a set of user roles, a set of data sets, their abstraction structures (final user role hierarchy and data set hierarchy) with classification levels and categories and the authorizations of user roles to access data sets (final permission set). 5 Conclusion In this paper we have demonstrated the applicability of a methodological approach for engineering role and lattice based mechanisms of a database access control system with a detailed implementation example based on the security requirements of a major Greek hospital. The whole process of applying the engineering methodology aims to transforming application and organization parameters into a set of authorization rules that can be implemented subsequently with the security mechanisms of the emedac security model. Applying the proposed methodology to a new or existing information system results in an access control system that allows separation of application and authorization logic, which makes application development, deployment and maintenance more cost-effective and easily enforces organizational policies across different applications. Hence, the resulting access control system can easily follow the evolution of the or-
13 254 ganization and adapt to the progress of the information system without affecting the primary application data, while maintaining a fine-grained level of granularity with multilevel access control at the same time. References 1. R. Sandhu: Access Control: The Neglected Frontier. Proceedings 1st Australian Conference on Information Security and Privacy. Wollongong, Australia (1996) 2. S. Castano, M. Fugini, G. Martella, P. Samarati: Database Security, Addison-Wesley (1994) 3. R. Sandhu and P. Samarati: Authentication, Access Control, and Intrusion Detection. The Computer Science and Engineering Handbook (1997) 4. G. Pangalos and M. Khair: Design of a Secure Medical Database Systems. Proceedings IFIP Conference on Information Systems Security - Facing the Information Society of the 21st Century. (1996) 5. G. Pangalos: Secure Medical Databases. Proceedings IMIA Security Conference. Finland (1996) 6. I. Mavridis, G. Pangalos, and M. Khair: emedac: Role-based Access Control Supporting Discretionary and Mandatory Features. Proceedings 13th IFIP WG 11.3 Working Conference on Database Security. Seattle WA, (1999) 7. D. Bell, and L. LaPadula: Secure Computer Systems: Unified Exposition and Multics Interpretation. Tech Report ESD-TR MITRE Corporation (1976) 8. R. Sandhu: Role-Based Access Control. In: Advances in Computers, Vol.46. Academic Press (1998) 9. D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. Richard Kuhn, R. Chandramouli: Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security, 4(3), (2001) 10. I. Sommerville: Software Engineering. Addison-Wesley Publishing Company, (1996) 11. G. Pernull: Database Security. In: Advances in Computers, Vol.38. Academic Press (1994) 12. R. Sandhu: Relational Database Access Controls. In: Handbook of Information Security Management ( Yearbook). Auerbach Publishers (1994) G. Neumann and M. Strembeck: A Scenario-driven Role Engineering Process for Functional RBAC Roles. Proceedings SACMAT Conference, Monterey, CA (2002) 14. S. Katsikas and D. Gritzalis: High Level Security Policy Guidelines. In: Data Security for Health Care, Vol.II Technical Guidelines. Ed. SEISMED Consortium. IOS Press (1996) 15. D.A. Marca and C.L. McGowan: SADT: Structured Analysis and Design Technique. McGraw-Hill, (1988) 16. B. Blobel, G. Bleumer, A. Muller, E. Flikkenschild, and F. Ottes: Current Security Issues Faced by Health Care Establishments. Proceedings Conference on Implementing Secure Healthcare Telematics Applications in Europe (ISHTAR) (1996)
Role-Based Access Control Requirements Model with Purpose Extension
Role-Based Access Control Requirements Model with Purpose Extension Faranak Farzad 1, Eric Yu Faculty of Information Studies University of Toronto, Canada Patrick C. K. Hung Faculty of Business and Information
An Object Oriented Role-based Access Control Model for Secure Domain Environments
International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer
Completeness, Versatility, and Practicality in Role Based Administration
Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović [email protected] Abstract Applying role based administration to role based access control systems has
DYNAMIC ACCESS CONTROL MANAGEMENT USING EXPERT SYSTEM TECHNOLOGY
DYNAMIC ACCESS CONTROL MANAGEMENT USING EXPERT SYSTEM TECHNOLOGY Prof. G. Pangalos ([email protected]) G. Vakaros Ms.C. ( [email protected]), Ch. Georgiadis Ph.D. ( [email protected]) Informatics Lab, Faculty
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach
A Model for Context-dependent Access Control for Web-based Services with Role-based Approach Ruben Wolf, Thomas Keinz, Markus Schneider FhG Institute for Secure Telecooperation (SIT), 64293 Darmstadt,
Secure Database Development
Secure Database Development Jan Jurjens () and Eduardo B. Fernandez (2) () Computing Department, The Open University, Milton Keynes, MK7 8LA GB http://www.jurjens.de/jan (2) Dept. of Computer Science,
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Comparing Simple Role Based Access Control Models and Access Control Lists. Abstract. 1 Introduction
Comparing Simple Role Based Access Control Models and Access Control Lists John Barkley National Institute of Standards and Technology Gait hersburg MD 20899 (301) 975-3346 j barkleyanist.gov Abstract
1. Introduction. 2. Background. 2.1. Cloud computing in a nutshell
Title: Towards new access control models for Cloud computing systems Category: 'In the Cloud' - Security Author name: Gouglidis Antonios City, Country: Thessaloniki, Greece Year of study, Course Title:
CHAPTER 22 Database Security Integration Using Role-Based Access Control
CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 [email protected]
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
Access Control Models Part I. Murat Kantarcioglu UT Dallas
UT DALLAS Erik Jonsson School of Engineering & Computer Science Access Control Models Part I Murat Kantarcioglu UT Dallas Introduction Two main categories: Discretionary Access Control Models (DAC) Definition:
A Database Security Course on a Shoestring
A Database Security Course on a Shoestring ABSTRACT Binto George Computer Science Department Western Illinois University 1 University Circle Macomb, IL 61455 [email protected] Database security has paramount
Workflow Access Control from a Business Perspective
Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID
Implementation of Mandatory Access Control in Role-based Security System. CSE367 Final Project Report. Professor Steve Demurjian. Fall 2001.
Implementation of Mandatory Access Control in Role-based Security System CSE367 Final Project Report Professor Steve Demurjian Fall 2001 Jin Ma Computer Science & Engineering The University of Connecticut
A logical approach to dynamic role-based access control
A logical approach to dynamic role-based access control Philippe Balbiani Yannick Chevalier Marwa El Houri Abstract Since its formalization RBAC has become the yardstick for the evaluation of access control
Implementing XML-based Role and Schema Migration Scheme for Clouds
Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 [email protected]
Role-Based Access Control (RBAC): Features and Motivations
Role-Based Access Control (RBAC): Features and Motivations David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn National Institute of Standards and Technology U. S. Department of Commerce Gaithersburg
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
Access Control Intro, DAC and MAC. System Security
Access Control Intro, DAC and MAC System Security System Security It is concerned with regulating how entities use resources in a system It consists of two main phases: Authentication: uniquely identifying
Incorporating database systems into a secure software development methodology
Incorporating database systems into a secure software development methodology Eduardo B. Fernandez 1, Jan Jurjens 2, Nobukazu Yoshioka 3, and Hironori Washizaki 4 1 Dept. of Computer Science, Florida Atlantic
Information Security Policy
Essay 7 Information Security Policy Ingrid M. Olson and Marshall D. Abrams This essay discusses information security policy, focusing on information control and dissemination, for automated information
SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES
82-10-44 DATA SECURITY MANAGEMENT SECURITY MODELS FOR OBJECT-ORIENTED DATA BASES James Cannady INSIDE: BASICS OF DATA BASE SECURITY; Discretionary vs. Mandatory Access Control Policies; Securing a RDBMS
Role Based Access Control
Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!
Chapter 8 The Enhanced Entity- Relationship (EER) Model
Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization
Session objectives. Access control. Subjects and objects. The request. Information Security
The session Session objectives Access Control Information Security Dr Hans Georg Schaathun Introduce fundamental terminology of access control Understand principles of privilege management and identity
Role-based Authorization Constraints Specification Using Object Constraint Language
Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte [email protected] Michael. E. Shin
Requirements Management
REQUIREMENTS By Harold Halbleib Requirements Management Identify, Specify, Track and Control Requirements Using a Standard Process About the author... Harold Halbleib has a degree in Electrical Engineering
Web Services: Role Based Access Control with Single Sign-on Architecture
Rochester Institute of Technology Department of Computer Science M.S. Computer Science Project Proposal Web Services: Role Based Access Control with Single Sign-on Architecture Yevgeniy Gershteyn [email protected]
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS
THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming
How Can Data Sources Specify Their Security Needs to a Data Warehouse?
How Can Data Sources Specify Their Security Needs to a Data Warehouse? Arnon Rosenthal The MITRE Corporation [email protected] Edward Sciore Boston College (and MITRE) [email protected] Abstract In current warehouse
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill
Implementation of Mandatory Access Control in Role-based Security System with Oracle Snapshot Skill CSE 367 Independent Study Final Project Report Prof. Steve Demurjian December, 13 2001 Hui Wang Lisa
Proposed NIST Standard for Role-Based Access Control
Proposed NIST Standard for Role-Based Access Control DAVID F. FERRAIOLO National Institute of Standards and Technology RAVI SANDHU SingleSign On. Net and George Mason University, [email protected] or www.list.gmu.edu
Role-based access control. RBAC: Motivations
Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS
CLOUD-HOSTED PROXY BASED COLLABORATION IN MULTI- CLOUD COMPUTING ENVIRONMENTS WITH ABAC METHODS Shilpa G S 1, Maria Navin J R 2 1 PG Student, Dept. of Computer Science and Engineering, SVCE Bangalore,
USER ACCESS CONTROL AND SECURITY MODEL
102 USER ACCESS CONTROL AND SECURTY MODEL Cahyo Crysdian, Harihodin b. Selamat, Mohd. Noor b. Md. Sap ([email protected], [email protected], [email protected]) Faculty of Computer Science and nformation
Role Based Access Control Framework for Network Enterprises
Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 [email protected]
Role-Based Access Control (RBAC) Role Engineering Process Version 3.0
Role-Based Access Control (RBAC) Role Engineering Process Version 3.0 Developed For: The Healthcare RBAC Task Force Developed by: Science Applications International Corporation (SAIC) TABLE OF CONTENTS
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
Applying Object-Oriented Principles to the Analysis and Design of Learning Objects
Applying Object-Oriented Principles to the Analysis and Design of Learning Objects Chrysostomos Chrysostomou and George Papadopoulos Department of Computer Science, University of Cyprus, Nicosia, Cyprus
Components- Based Access Control Architecture
Issue s in Informing Science and Information Technology Volume 6, 2009 Components- Based Access Control Architecture Adesina S. Sodiya and Adebukola S. Onashoga Department of Computer Science, University
A Critique of the ANSI Standard on Role Based Access Control
A Critique of the ANSI Standard on Role Based Access Control Ninghui Li Ji-Won Byun Elisa Bertino CERIAS and Department of Computer Science Purdue University 656 Oval Drive, West Lafayette, IN 47907-2086
A Secure Mediator for Integrating Multiple Level Access Control Policies
A Secure Mediator for Integrating Multiple Level Access Control Policies Isabel F. Cruz Rigel Gjomemo Mirko Orsini ADVIS Lab Department of Computer Science University of Illinois at Chicago {ifc rgjomemo
Best Practices, Procedures and Methods for Access Control Management. Michael Haythorn
Best Practices, Procedures and Methods for Access Control Management Michael Haythorn July 13, 2013 Table of Contents Abstract... 2 What is Access?... 3 Access Control... 3 Identification... 3 Authentication...
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks
Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 [email protected]
System Development and Life-Cycle Management (SDLCM) Methodology. Approval CISSCO Program Director
System Development and Life-Cycle Management (SDLCM) Methodology Subject Type Standard Approval CISSCO Program Director A. PURPOSE This standard specifies content and format requirements for a Physical
DISCRETIONARY ACCESS CONTROL. Tran Thi Que Nguyet Faculty of Computer Science & Engineering HCMC University of Technology [email protected].
DISCRETIONARY ACCESS CONTROL Tran Thi Que Nguyet Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Outline 1 2 3 4 Introduction to Discretionary Access
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
Integrating Attributes into Role-Based Access Control
Integrating Attributes into Role-Based Access Control Qasim Mahmood Rajpoot 1(B), Christian Damsgaard Jensen 1, and Ram Krishnan 2 1 Department of Applied Mathematics and Computer Science, Technical University
ACaaS: Access Control as a Service for IaaS Cloud
ACaaS: Access Control as a Service for IaaS Cloud Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi and Haiyong Xie Arizona State University, Tempe, AZ 85287, USA Email: {ruoyu.wu, gahn, hsharif1}@asu.edu
Polyinstantiation in Relational Databases with Multilevel Security
Polyinstantiation in Relational Databases with Multilevel Security Andro Galinovi King ICT d.o.o., Buzinski prilaz 10, 10010 Zagreb, Croatia E-mail: [email protected] Vlatka Anton i University
Role Engineering: The Cornerstone of Role- Based Access Control DECEMBER 2009
WHITE PAPER: ROLE ENGINEERING AND ROLE-BASED ACCESS CONTROL Role Engineering: The Cornerstone of Role- Based Access Control DECEMBER 2009 Srinivasan Vanamali, CISA, CISSP CA SERVICES Table of Contents
Configuration Management Models in Commercial Environments
Technical Report CMU/SEI-91-TR-7 ESD-9-TR-7 Configuration Management Models in Commercial Environments Peter H. Feiler March 1991 Technical Report CMU/SEI-91-TR-7 ESD-91-TR-7 March 1991 Configuration Management
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments
Chapter 2 Taxonomy and Classification of Access Control Models for Cloud Environments Abhishek Majumder, Suyel Namasudra and Samir Nath Abstract Cloud computing is an emerging and highly attractive technology
On XACML, role-based access control, and health grids
On XACML, role-based access control, and health grids 01 On XACML, role-based access control, and health grids D. Power, M. Slaymaker, E. Politou and A. Simpson On XACML, role-based access control, and
Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model
, pp.126-131 http://dx.doi.org/10.14257/astl.2013.29.26 Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model Shu-Ping Lu 1, Kuei-Kai Shao 1, Yu-Nung Chao 1, Kuo-Shu Luo
Modeling Temporal Data in Electronic Health Record Systems
International Journal of Information Science and Intelligent System, 3(3): 51-60, 2014 Modeling Temporal Data in Electronic Health Record Systems Chafiqa Radjai 1, Idir Rassoul², Vytautas Čyras 3 1,2 Mouloud
Software Architecture Document
Software Architecture Document Natural Language Processing Cell Version 1.0 Natural Language Processing Cell Software Architecture Document Version 1.0 1 1. Table of Contents 1. Table of Contents... 2
Role-Based Access Controls
Role-Based Access Controls Reprinted from 15th National Computer Security Conference (1992) Baltimore, Oct 13-16, 1992. pp. 554-563 David F. Ferraiolo and D. Richard Kuhn National Institute of Standards
A methodology for secure software design
A methodology for secure software design Eduardo B. Fernandez Dept. of Computer Science and Eng. Florida Atlantic University Boca Raton, FL 33431 [email protected] 1. Introduction A good percentage of the
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange
Patient-Centric Secure-and-Privacy-Preserving Service-Oriented Architecture for Health Information Integration and Exchange Mahmoud Awad and Larry Kerschberg Center for Health Information Technology George
ISSECO Syllabus Public Version v1.0
ISSECO Syllabus Public Version v1.0 ISSECO Certified Professional for Secure Software Engineering Date: October 16th, 2009 This document was produced by the ISSECO Working Party Syllabus Introduction to
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions
Meta Model Based Integration of Role-Based and Discretionary Access Control Using Path Expressions Kathrin Lehmann, Florian Matthes Chair for Software Engineering for Business Information Systems Technische
Welcome to Information Systems Security (503009)
Welcome to (503009) Nguyen Thi Ai Thao Faculty of Computer Science & Engineering HCMC University of Technology [email protected] Course Outline Week Lectures 1 Information systems security: basic
Clarifying a vision on certification of MDA tools
SCIENTIFIC PAPERS, UNIVERSITY OF LATVIA, 2010. Vol. 757 COMPUTER SCIENCE AND INFORMATION TECHNOLOGIES 23 29 P. Clarifying a vision on certification of MDA tools Antons Cernickins Riga Technical University,
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Database Security Sabrina De Capitani di Vimercati, Dip. Elettronica, Universita di Brescia, 25123 Brescia, Italy Pierangela Samarati, Dip. di Tecnologie dell'informazione, Universita di Milano, 26013
Requirements Traceability. Mirka Palo
Requirements Traceability Mirka Palo Seminar Report Department of Computer Science University of Helsinki 30 th October 2003 Table of Contents 1 INTRODUCTION... 1 2 DEFINITION... 1 3 REASONS FOR REQUIREMENTS
Identity Management and Access Control
and Access Control Marek Rychly [email protected] Strathmore University, @ilabafrica & Brno University of Technology, Faculty of Information Technology Enterprise Security 7 December 2015 Marek Rychly
Implement role based access control with attribute certificates
Implement role based access control with attribute certificates Wei Zhou Computer Science Department University of Trier D-54286 Trier, Germany [email protected] Christoph Meinel Computer Science Department
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2005, Vol.34, No.4 ISSUES ON FORMING METADATA OF EDITORIAL SYSTEM S DOCUMENT MANAGEMENT Marijus Bernotas, Remigijus Laurutis, Asta Slotkienė Information
Ensuring Access Control in Cloud Provisioned Healthcare Systems
Ensuring Access Control in Cloud Provisioned Healthcare Systems Hema Andal Jayaprakash Narayanan Department of Computer Science and Engineering University of Nevada, Reno Abstract An important issues in
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach Ruben Wolf and Markus Schneider Fraunhofer Gesellschaft (FhG), Institute for Secure Telecooperation (SIT)
Analysis of Different Access Control Mechanism in Cloud
Analysis of Different Access Control Mechanism in Cloud Punithasurya K Post Graduate Scholar Department of Information Technology Karunya University, India Jeba Priya S Lecturer Department of Information
