Providing interoperation among different information systems while preserving the security requirements of individual systems

نویسندگان

  • Csilla FARKAS
  • Parag TALEKAR
چکیده

Providing interoperation among different information systems while preserving their individual security requirements led to the development of flexible Access Control Models. The Authorization Specification Language (ASL) is a significant part of the infrastructure that can support and enforce uniform security requirements across platforms. For extensive deployment of these frameworks we need methodologies to translate existing Access Control Models into logic-based languages. In this paper we develop a technique to translate well-established access control specifications to ASL. More specifically, we study and develop methods to automatically translate Access Control Lists and Bell-LaPadula models to ASL. Such a transformation is clearly needed to ensure a unified framework for Access Control management. Manual transformations are inefficient and prone to errors. The main technical contribution of the paper is the development of algorithms to automate the transformation process, while preserving the Access Control requirements of the original systems. The efficiency and simplicity of the translations make them suitable for real applications.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications

Smart grid concept is introduced to modify the power grid by utilizing new information and communication technology. Smart grid needs live power consumption monitoring to provide required services and for this issue, bi-directional communication is essential. Security and privacy are the most important requirements that should be provided in the communication. Because of the complex design of s...

متن کامل

Privacy-preserving Ontology Matching

Increasingly, there is a recognized need for secure information sharing. In order to implement information sharing between diverse organizations, we need privacypreserving interoperation systems. In this work, we describe two frameworks for privacy-preserving interoperation systems. Ontology matching is an indispensable component of interoperation systems. To implement privacy-preserving intero...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003