skip to main content
10.1145/1503402.1503417acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Consistency checking of role assignments in inter-organizational collaboration

Authors Info & Claims
Published:04 November 2008Publication History

ABSTRACT

The establishment of globalization is driving inter- organizational collaboration towards a necessity. We cannot expect total conformity between organizations nor homogeneous security settings. Nevertheless, each organization, with its own security policies, needs to exchange data. Employees involved in inter-organizational tasks shall require remote access to data hosted by other organizations. Administrating access control policies for those employees creates problems for security officers, particularly for role assignments. Flexibility in extending (or restricting) permissions for roles imported from other organizations is required. In this work, we present an approach based on Description Logic formalisms to create from the inter-organizational agreement a set of bridge rules that in addition to (i) the permissions assigned to a given role from one organization and (ii) the permissions assigned to another role in the other organization, allows security officers to check consistency of the resulting combination of roles from both organizations.

References

  1. F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider, editors. The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. Bauer, S. Garriss, and M. K. Reiter. Detecting and resolving policy misconfigurations in access-control systems. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 185--194, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. E. Bertino, S. Jajodia, and P. Samarati. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26:2001, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Bhatti, A. Ghafoor, E. Bertino, and J. B. D. Joshi. X-gtrbac: an xml-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur., 8(2):187--227, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Borgida and L. Serafini. Distributed description logics: Assimilating information from peer sources. Journal of Data Semantics, (1):153--184, 2003.Google ScholarGoogle Scholar
  6. M. Buchheit, M. A. Jeusfeld, W. Nutt, and M. Staudt. Subsumption between queries to object-oriented databases. In EDBT '94: Proceedings of the 4th international conference on extending database technology, pages 15--22, New York, NY, USA, 1994. Springer-Verlag New York, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Chen and J. Crampton. Inter-domain role mapping and least privilege. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 157--162, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. M. Donini, M. Lenzerini, D. Nardi, and A. Schaerf. A hybrid system with datalog and concept languages. In In Trends in AI, volume LNAI 549, pages 88--97. Springer Verlag, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Du and J. B. D. Joshi. Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 228--236, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. D. Ferraiolo and D. Kuhn. Role based access control. In Proceedings of the 15th National Computer Security Conference, 1992.Google ScholarGoogle Scholar
  11. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. Rowlbac: representing role based access control in owl. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 73--82, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. T. Fruhwirth. Constraint handling rules. In Constraint Programming: Basics and Trends, LNCS 910, pages 90--107. Springer-Verlag, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H. Hu and G. Ahn. Enabling verification and conformance testing for access control model. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 195--204, New York, NY, USA, 2008. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. H. Kang, J. S. Park, and J. N. Froscher. Access control mechanisms for inter-organizational workflow. In In Proceedings of the Sixth ACM Symposium on Access control models and technologies (2001), ACM, pages 66--74. Press, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Ma, S. Ma, and Y. Sui. A dynamic description logic approach to extended rbac model. Future Generation Communication and Networking, 1:284--288, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. Miège. Modelling contexts in the or-bac model. In In 19th Annual Computer Security Applications Conference, Las Vegas, page 416, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7:247--280, 1989. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. B. Shafiq. Access Control Management and Security in Multi-Domain Collaborative Environments. PhD thesis. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Shen and P. Dewan. Access control for collaborative environments. pages 51--58. ACM Press, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. R. Smriti Sinha, Mousum Handique. Networks, data mining and artificial intelligence trends and future directions. Proc. Of the National Workshop on Trends in Advanced Computing, Narosa Publishers:pp 193--201, 2006.Google ScholarGoogle Scholar
  21. J. Vaidya, V. Atluri, and Q. Guo. The role mining problem: finding a minimal descriptive set of roles. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 175--184, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Warner, V. Atluri, R. Mukkamala, and J. Vaidya. Using semantics for automatic enforcement of access control policies among dynamic coalitions. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 235--244, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. C. Zhao, N. Heilili, S. Liu, and Z. Lin. Representation and reasoning on rbac: A description logic approach. In In ICTAC, pages 381--393, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Consistency checking of role assignments in inter-organizational collaboration

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      SPRINGL '08: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
      November 2008
      94 pages
      ISBN:9781605583242
      DOI:10.1145/1503402

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 November 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader