A Multi-policy Model for Access Control in Cooperative Information Systems

In the context of cooperative information systems, research focused on the interoperability among data sources, related to schematic and syntactic representations or semantic expression. Security introduces new problems of heterogeneity. In this paper we refer to the different ways to represent authorization and rules in access control policies. Our proposition consists in using a role based multy-policy model to represent heterogeneous policy in the same formalism. We also map the local policies creating access bridges and we propose a set of security controls to filter a global user query.

[1]  Vijayalakshmi Atluri,et al.  Role-based Access Control , 1992 .

[2]  A. M. Tjoa,et al.  Access controls for federated database environments - taxonomy of design choices , 1995 .

[3]  L.,et al.  SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .

[4]  Michael R. Genesereth,et al.  The Basis for Mediation , 1995, International Conference on Cooperative Information Systems.

[5]  Aneta Poniszewska-Maranda Implementation of Access Control Model for Distributed Information Systems Using Usage Control , 2011, SIIS.

[6]  Magali Seguran Résolution des conflits sémantiques dans les systèmes d'information coopératifs , 2003 .

[7]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[8]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[9]  Anas Abou El Kalam,et al.  Access Control for Collaborative Systems: A Web Services Based Approach , 2007, IEEE International Conference on Web Services (ICWS 2007).

[10]  Frédéric Cuppens,et al.  Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.

[11]  Danielle Boulanger,et al.  An Object Approach for Information System Cooperation , 1998, Inf. Syst..

[12]  Michael Wooldridge,et al.  Intelligent agents: theory and practice The Knowledge Engineering Review , 1995 .

[13]  Benedict G. E. Wiedemann Protection? , 1998, Science.

[14]  SandhuRavi,et al.  The UCONABC usage control model , 2004 .

[15]  Vipul Kashyap,et al.  So Far (Schematically) yet So Near (Semantically) , 1992, DS-5.

[16]  Aneta Poniszewska-Maranda,et al.  Representation of Extended RBAC Model Using UML Language , 2005, SOFSEM.

[17]  Karsten P. Ulland,et al.  Vii. References , 2022 .