Access control models in heterogeneous information systems: From conception to exploitation

The development of the information systems should answer more and more to the problems of federated data sources and the problems with the heterogeneous distributed information systems. The assurance of data access security realized in the cooperative information systems with loose connection among local data sources is hard to achieve mainly for two reasons: the local data sources are heterogeneous (i.e. data, models, access security models, semantics, etc.) and the local autonomy of systems does not allow to create a global integrated security schema. The paper proposes to use one common set of access control concepts to support the access control management in security of heterogeneous information systems. The UML (Unified Modelling Language) concepts can be used to define and implement the most popular access control models, such as DAC, MAC or RBAC. Next, the concepts derived from different models can be joined to use one common approach comprehensible for each administrator of each cooperative information system in the federation.

[1]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[2]  Danielle Boulanger,et al.  A Role-Based Model for Access Control in Database Federations , 2001, ICICS.

[3]  Aneta Poniszewska-Maranda,et al.  Security Constraints in Access Control of Information System Using UML Language , 2006, 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE'06).

[4]  R. Sandhu,et al.  Access control: principles and practice , 1994, IEEE Commun. Mag..

[5]  Aneta Poniszewska-Maranda,et al.  Access Control Coherence of Information Systems Based on Security Constraints , 2006, SAFECOMP.

[6]  Elena Ferrari,et al.  Database Security , 2009, Encyclopedia of Database Systems.

[7]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[8]  Elisa Bertino,et al.  Role Based Access Control Models , 2001, Inf. Secur. Tech. Rep..

[9]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[10]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[11]  Aneta Poniszewska-Maranda,et al.  Representation of Extended RBAC Model Using UML Language , 2005, SOFSEM.

[12]  강문설 [서평]「The Unified Modeling Language User Guide」 , 1999 .

[13]  Ivar Jacobson,et al.  The Unified Modeling Language User Guide , 1998, J. Database Manag..