Conflicts between Geoxacml Access Control Policies in Geographic Information Systems

نویسندگان

  • Mohamed Yahiaoui
  • Ahmed Zinedine
  • Mostafa Harti
چکیده

In our days, geospatial data play a key role in a wide spectrum of critical fields, such as disaster and emergency management, environmental monitoring, land and city planning. The specific nature of these geospatial data presents many challenges in terms of security. Indeed, security issues for geospatial data are different and in many ways more complex than security issues for relational data. Among these challenges, we find the detection and resolution of conflicts/anomalies between access control policies which is a very common situation in this kind of systems. In this work we deal with the problem of detection and resolution of conflicts/anomalies between GEOXACML policies. That is the case where several policies provide conflicting answers to a same request. We give more attention to the mathematical formalism of the problem. We introduce the notion of the canonical representation of the query space which is a classification that provides a natural way to handle interferences between policy targets (in other words conflicts/anomalies). Then we highlight the key role that this canonical representation will play as the core of a future Framework for conflict detection and resolution in GEOXACML access control systems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Zugriffskontrolle in serviceorientierten Architekturen am Beispiel von Geodateninfrastrukturen

The central components of spatial data infrastructures (SDIs) are Geo Web Services. These services provide functionalities that allow distributed users to use and manage spatial data. Various business rules, legal restrictions and commercial interests require the deployment of access control systems in SDIs. These systems must ensure that only authorized interactions between users and services ...

متن کامل

Aligning ABAC Policies with Information Security Policies using Controlled Vocabulary

Attribute-based Access Control (ABAC) policies are based on mutually processable policy attributes. Assigned permissions in such policies need to be reflected or combined with organisational constraints. Best practice in information security dictates having the operational need to access a particular information artifact independent from the function of the specific application systems. Consequ...

متن کامل

Access control in ultra-large-scale systems using a data-centric middleware

  The primary characteristic of an Ultra-Large-Scale (ULS) system is ultra-large size on any related dimension. A ULS system is generally considered as a system-of-systems with heterogeneous nodes and autonomous domains. As the size of a system-of-systems grows, and interoperability demand between sub-systems is increased, achieving more scalable and dynamic access control system becomes an im...

متن کامل

A Study of the Application of Geographic Information Systems (GIS) in Children Access to Pharmacies: A Case Study of Kermanshah, West of Iran

Background Adequate access to health services has tremendous effects on the usefulness and efficiency of health care. Therefore, this study aimed to investigate the access of girls under the age of 14 years old to pharmacies in Kermanshah, Iran. Materials and Methods In this cross-sectional study, the access of Results In terms of access to 25 pharmacies through walking, the findings revealed ...

متن کامل

Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services Environments

Web Services technologies are now an active research area. By integrating individual existing web systems the technology enables the provision of advanced and sophisticated services, such as allowing users to use different types of resources and services simultaneously in a simple procedure. However the management and maintenance of a large number of Web Services is not easy and, in particular,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014