Secure collaboration based on RBAC in decentralized multi-domain environments

Advance technologies in decentralized systems are the new building block of today's Internet and provide interoperability among heterogeneous databases. In these environments, interoperation and information sharing are one of the most critical issues. Interoperability enables users to access database in different domain. Furthermore, government, financial and medical institutions more require secure collaboration to share their data with organizations. However secure collaboration has many challenging problem in multi-domain environments. In this paper, we propose secure collaboration to effectively share resource by reconcilement structure. Proposed scheme is based on Role Based Access Control (RBAC) to support flexible control. In decentralized RBAC-based system, the number of roles can be in the hundreds or thousands and they share information among dispersed domains. We present solution which regulates the interoperability.

[1]  Elisa Bertino,et al.  SERAT: SEcure role mApping technique for decentralized secure interoperability , 2005, SACMAT '05.

[2]  Elisa Bertino,et al.  Secure interoperation in a multidomain environment employing RBAC policies , 2005, IEEE Transactions on Knowledge and Data Engineering.

[3]  Ruixuan Li,et al.  Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments , 2007, ICISC.

[4]  Li Gong,et al.  Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..

[5]  Angelos D. Keromytis,et al.  Decentralized access control in distributed file systems , 2008, CSUR.

[6]  Mao Bi,et al.  Role based Access Control Model , 2003 .

[7]  Elisa Bertino,et al.  Database security - concepts, approaches, and challenges , 2005, IEEE Transactions on Dependable and Secure Computing.

[8]  James B. D. Joshi,et al.  An RBAC framework for time constrained secure interoperation in multi-domain environments , 2005, 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems.

[9]  Jean Bacon,et al.  Toward open, secure, widely distributed services , 2002, CACM.

[10]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[11]  Elisa Bertino,et al.  A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..

[12]  David J. DeWitt,et al.  Limiting Disclosure in Hippocratic Databases , 2004, VLDB.

[13]  Pierangela Samarati,et al.  Providing Security and Interoperation of Heterogeneous Systems , 2004, Distributed and Parallel Databases.