Implementation of Access Control Model for Distributed Information Systems Using Usage Control

Currently, the rapid development of information technology requires also the additional features for access control domain. The information is more and more distributed through the networks or federation of numerous information systems located in different places in a country or on the globe. In order to meet the requirements and problems of modern access control, a new implementation of access control model, called implementation of Role-based Usage Control (iRBUC) model is proposed. Proposed iRBUC assures the usage control in accessing data, which is very important especially in distributed information systems, and assures the organization of access control strategies well-described in RBAC (Role-Based Access Control) model or its extensions.

[1]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[2]  Elisa Bertino,et al.  A generalized temporal role-based access control model , 2005, IEEE Transactions on Knowledge and Data Engineering.

[3]  Alexander Pretschner,et al.  Distributed usage control , 2006, CACM.

[4]  Yuanzhong Shu,et al.  Research on an UCON model supporting distributed management , 2008, 2008 International Conference on Information and Automation.

[5]  D. Elliott Bell,et al.  Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .

[6]  Elisa Bertino,et al.  A Temporal Access Control Mechanism for Database Systems , 1996, IEEE Trans. Knowl. Data Eng..

[7]  Aneta Poniszewska-Maranda,et al.  Representation of Extended RBAC Model Using UML Language , 2005, SOFSEM.

[8]  Ivar Jacobson,et al.  The Unified Modeling Language User Guide , 1998, J. Database Manag..

[9]  Aneta Poniszewska-Maranda Access control models in heterogeneous information systems: From conception to exploitation , 2008, 2008 International Multiconference on Computer Science and Information Technology.

[10]  Gail-Joon Ahn,et al.  The rcl 2000 language for specifying role-based authorization constraints , 2000 .

[11]  Aneta Poniszewska-Maranda,et al.  Role engineering: From design to evolution of security schemes , 2008, J. Syst. Softw..

[12]  Fabio Martinelli,et al.  Usage control in computer security: A survey , 2010, Comput. Sci. Rev..

[13]  Jaehong Park,et al.  Attribute Mutability in Usage Control , 2004, DBSec.

[14]  Jaehong Park,et al.  Formal model and policy specification of usage control , 2005, TSEC.

[15]  Silvana Castano,et al.  Database Security , 1997, IFIP Advances in Information and Communication Technology.

[16]  Vijayalakshmi Atluri,et al.  An authorization model for temporal data , 2000, CCS.

[17]  Vijayalakshmi Atluri,et al.  An authorization model for temporal and derived data: securing information portals , 2002, TSEC.

[18]  Peter Vojtáš SOFSEM 2005: Theory and Practice of Computer Science, 31st Conference on Current Trends in Theory and Practice of Computer Science, Liptovský Ján, Slovakia, January 22-28, 2005, Proceedings , 2005, SOFSEM.

[19]  Deborah Downs,et al.  Issues in Discretionary Access Control , 1985, 1985 IEEE Symposium on Security and Privacy.

[20]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[21]  P. Samarati,et al.  Access control: principle and practice , 1994, IEEE Communications Magazine.

[22]  Jaehong Park,et al.  The UCONABC usage control model , 2004, TSEC.

[23]  Gail-Joon Ahn,et al.  Role-based authorization constraints specification , 2000, TSEC.

[24]  Elisa Bertino,et al.  TRBAC , 2001, ACM Trans. Inf. Syst. Secur..