Authorization Model for Strongly Distributed Information Systems

نویسنده

  • Daniel Cvrček
چکیده

The title of the thesis contains words strongly distributed systems1. This means information systems that are able to process tasks that may be distributed not only in space, but also in time. What we are going to discuss are problems related to processing tasks with long time durability those processing is performed in multiple information systems with their own administration. More and more often we can hear about Workflow management systems (WfMS) that are used to automate business activities. Those information systems are typical systems with the above mentioned properties and the thesis uses both terms as synonyms. Today, WfMS represent an important, inter-disciplinary area which is commercially significant. The widespread use of workflow applications has lead to increased awareness of data security issues. This dissertation identifies levels of access control and authorization requirements. Specifies discretionary and mandatory access controls for the workflow systems and proposes suitable security model. The thesis proposes a formal framework, based on process algebra Calculus of Communicating Systems (CCS), for modeling and analyzing of security properties of WfMS. The specific contributions of the thesis are as follows: 1. Active authorization model (AAM) is proposed. The model provides basic features necessary for synchronization of authorization flow with 1The notion strongly distributed system is used throughout this thesis for systems that are distributed in space (there are several autonomous nodes that communicate) and that are able to execute computational tasks that have long lifetime and that may be executed on several autonomous nodes

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Towards an authorisation model for distributed systems based on the Semantic Web

Authorization is a crucial process in current information systems. Nowadays, many of the current authorization systems do not provide methods to describe the semantics of the underlying information model which they are protecting. This fact can lead to mismatch problems between the semantics of the authorization model and the semantics of the underlying data and resources being protected. In or...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

SecureUML: A UML-Based Modeling Language for Model-Driven Security

We present a modeling language for the model-driven development of secure, distributed systems based on the Unified Modeling Language (UML). Our approach is based on role-based access control with additional support for specifying authorization constraints. We show how UML can be used to specify information related to access control in the overall design of an application and how this informati...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000