TY - GEN
T1 - An attribute graph based approach to map local access control policies to credential based access control policies
AU - Warner, Janice
AU - Atluri, Vijayalakshmi
AU - Mukkamala, Ravi
PY - 2005
Y1 - 2005
N2 - Due to the proliferation of the Internet and web based technologies, today's collaborations among organizations are increasingly short-lived, dynamic, and therefore formed in an ad-hoc manner to serve a specific purpose. Such example environments include web-services, dynamic coalitions, grid computing and ubiquitous computing. These environments necessitate the need for dynamic, efficient and secure sharing of resources among disparate organizations. Although such secure sharing of resources can be achieved by means of traditional access control and authentication mechanisms, they are administratively difficult when the partnerships and interactions are short-lived and constantly changing. When allowing sharing of resources, the organization must ensure that its own security policies are adhered to. Our proposal is to allow users, external to the organization, access to internal resources of the organization, if they possess certain attributes similar to those possessed by the internal users, We begin by first examining the internal security policies within an organization and attempt to map them to credential based policies. In essence, we identify the attributes possessed by internal users relevant to a security policy, and map them to credential attributes that are understood across organizations. Access can then be granted to users once they submit these required credentials with the identified attributes. We present an attribute graph based methodology to accomplish such a mapping, In this paper, we assume that the local access control policies are limited to Role Based Access Control (RBAC) policies.
AB - Due to the proliferation of the Internet and web based technologies, today's collaborations among organizations are increasingly short-lived, dynamic, and therefore formed in an ad-hoc manner to serve a specific purpose. Such example environments include web-services, dynamic coalitions, grid computing and ubiquitous computing. These environments necessitate the need for dynamic, efficient and secure sharing of resources among disparate organizations. Although such secure sharing of resources can be achieved by means of traditional access control and authentication mechanisms, they are administratively difficult when the partnerships and interactions are short-lived and constantly changing. When allowing sharing of resources, the organization must ensure that its own security policies are adhered to. Our proposal is to allow users, external to the organization, access to internal resources of the organization, if they possess certain attributes similar to those possessed by the internal users, We begin by first examining the internal security policies within an organization and attempt to map them to credential based policies. In essence, we identify the attributes possessed by internal users relevant to a security policy, and map them to credential attributes that are understood across organizations. Access can then be granted to users once they submit these required credentials with the identified attributes. We present an attribute graph based methodology to accomplish such a mapping, In this paper, we assume that the local access control policies are limited to Role Based Access Control (RBAC) policies.
UR - http://www.scopus.com/inward/record.url?scp=33646855250&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33646855250&partnerID=8YFLogxK
U2 - 10.1007/11593980_10
DO - 10.1007/11593980_10
M3 - Conference contribution
AN - SCOPUS:33646855250
SN - 3540307060
SN - 9783540307068
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 134
EP - 147
BT - Information Systems Security - First International Conference, ICISS 2005, Proceedings
T2 - 1st International Conference on Information Systems Security, ICISS 2005
Y2 - 19 December 2005 through 21 December 2005
ER -