Abstract
This paper focuses on a framework that ensures the safe use of protected Web resources among independent organizations in collaboration. User membership and group membership in each organization are managed independently of other organizations. User authentication and user authorization for a protected resource in one organization is determined by user group membership in other organizations. Furthermore, users never discloses their user-identifiers and passwords in a foreign domain. Every set of related roles in a single organization is defined as an antichain and every set of related roles in the collaborating organizations is defined as a complete lattice. The ranking order of roles for a resource depends on operations. One can add or remove users from roles by managing their membership in corresponding groups.
Chapter PDF
Similar content being viewed by others
Keywords
References
E. Barka and R. Sandhu. Role-based delegation model/hierarchical roles. 20th Annual Computer Security Applications Conference, Tucson, Arizona, 2004.
E. Bertino E., P.A. Bonatti and E. Ferrari. TRBAC: A temporal Role-Based Access Control model. ACM Transactions on information and system security 3(3): 191–223, 2001.
R. Bhatti, E. Bertino, A. Ghafoor and J.B.D. Joshi. XML-based specification for Web services document security. IEEE Computer 37(4), 2004.
C. Carpineto and G. Romano. Concept Data Analysis: Theory and Applications. John Wiley and Sons, Ltd., 2004.
S-C. Chou. L n RBAC: A multiple-levelled Role-Based Access Control model for protecting privacy in object-oriented systems. Journal of Object Technology 3(3):91–120, 2004.
B.A. Davey and H.A. Priestley. Introduction to lattices and order. Cambridge University Press, 2005.
D. Denning. A lattice model of secure information flow. Communications of the ACM 19(5) 1976.
J. Dowling and V. Cahill. Self-managed decentralized systems using K-components and collaborative reinforcement learning. Proceedings of the Workshop on Self Managed Systems, 41–49, 2004.
D. Ferraiolo, R. Sandhu, S. Gavrila, R.D. Kuhn and R. Chandramouli. Proposed NIST standard for Role-Based Access Control. ACM Transactions on Information and System Security. 4(3):224–274, 2001.
D. Ferraiolo, and R.D. Kuhn and R. Chandramouli. Role-Based Access Control. Computer Security Series. Artech House, 2003.
B. Ganter, G. Stumme and R. Wille. Formal Concept Analysis-Foundations and Applications. Springer LNCS 114, Berlin, 3626, 2005.
A. Martelli and D. Ascher. Python Cookbook. O’Reilly, UK, 2002.
T. Hildmann and J. Barholdt. Managing trust between collaborating companies using outsourced role based control. 4rd ACM Workshop on RBAC, 105–111, 1999.
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor and Y. Ravid. Access control meets public key infrastructure, Or; Assigning roles to strangers. IEEE Symposium on security and privacy, 2000.
B. Kropp and M. Gallaher, Role-based access control systems can save organizations time and money. Information Security Magazine, 2005.
http://www.oasis-open.org
R. Sandhu. Lattice-Based access control models. IEEE Computer, 26(11), 1993.
R. Sandhu. Role activation hierarchies. 3rd ACM Workshop on RBAC, 33–40, 1998.
http://shibboleth.internet2.edu/shib-intro.html
R. Simon and M. Zurko. Separation of duty in role-based environments. Proceedings of 10th IEEE Computer Security Foundations Workshop. Rockport, Mass., 183–194, 1997.
M. Strembeck and G. Neumann. An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security, 7(3):392–427, 2004.
R. Taouil and Y. Bastide. Computing proper implications. Proceedings of the IOCS-2001 International Workshop on Concept Lattice-Based Theory, methods and Tools for Knowledge Discovery in Databases, Palo Alto, CA, USA, 49–61 2001.
R. Wille. Concept lattices and conceptual knowledge systems. Computers Math. Applic. 23(6–9):493–515, 1992.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 International Federation for Information Processing
About this paper
Cite this paper
Encheva, S., Tumin, S. (2006). Safe Use of Protected Web Resources. In: Shi, Z., Shimohara, K., Feng, D. (eds) Intelligent Information Processing III. IIP 2006. IFIP International Federation for Information Processing, vol 228. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-44641-7_17
Download citation
DOI: https://doi.org/10.1007/978-0-387-44641-7_17
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-44639-4
Online ISBN: 978-0-387-44641-7
eBook Packages: Computer ScienceComputer Science (R0)