Security Violation Detection for RBAC Based Interoperation in Distributed Environment
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes a security violation detection method for RBAC based interoperation to meet the requirements of secure interoperation among distributed systems. We use role mappings between RBAC systems to implement trans-system access control,, analyze security violation of interoperation with role mappings, and formalize definitions of secure interoperation. A minimum detection method according to the feature of RBAC system in distributed environment is introduced in detail. This method reduces complexity by decreasing the amount of roles involved in detection. Finally, we analyze security violation further based on the minimum detection method to help administrators eliminate security violation.
著者
-
HUANG Chao
Computer College of Zhejiang University
-
SUN Jianling
Computer College of Zhejiang University
-
WANG Xinyu
Computer College of Zhejiang University
-
YANG Xiaohu
Computer College of Zhejiang University
-
WU Di
Computer College of Zhejiang University
関連論文
- Inconsistency Resolution Method for RBAC Based Interoperation
- Security Violation Detection for RBAC Based Interoperation in Distributed Environment
- Security Violation Detection for RBAC Based Interoperation in Distributed Environment
- Inconsistency Resolution Method for RBAC Based Interoperation
- Mining Noise-Tolerant Frequent Closed Itemsets in Very Large Database
- Finding Frequent Closed Itemsets in Sliding Window in Linear Time
- Feature Location in Source Code by Trace-Based Impact Analysis and Information Retrieval