Skip to main content

Access Control Coherence of Information Systems Based on Security Constraints

  • Conference paper
Computer Safety, Reliability, and Security (SAFECOMP 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4166))

Included in the following conference series:

Abstract

Security administration in an information system is a complex task. In order to be defined properly, the security policy requires formulation of a large number of security constraints. Moreover, the information system used in an enterprise should be coherent, which means that all its element, including relations between them as well as their constraints should posses this property.

The objective of this paper is to present security constraints of a security schema in an information system based on the RBAC model and the methods to assure the coherence of global security schema. Starting from the global schema of the coherent security, any insertion of a new application should respect the global coherence of the new security schema being the consequence of the fusion of these two schemas.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. ACM Press, Addison-Wesley (1994)

    Google Scholar 

  2. Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2) (1996)

    Google Scholar 

  3. Ferraiolo, D., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Role-Based Access Control. ACM, TISSEC (2001)

    Google Scholar 

  4. Ahn, G.-J.: The RCL 2000 Language for Specifying Role-Based Authorization Constraints (1999)

    Google Scholar 

  5. Ahn, G.-J., Sandhu, R.S.: The RSL 1999 Language for Role-Based Separation of Duty Constraints. ACM Transactions on RBAC (1999)

    Google Scholar 

  6. Ahn, G.-J., Sandhu, R.S.: Role-based Authorization Constraints Specification. ACM Transactions on Information and Systems Security (2000)

    Google Scholar 

  7. Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modeling Language User Guide. Addison Wesley, Reading (1998)

    Google Scholar 

  8. Warmer, J.B., Kleppe, A.G.: The Object Constraint Language. Precise modeling with UML. Addison-Wesley, Reading (1999)

    Google Scholar 

  9. Goncalves, G., Hemery, F., Poniszewska, A.: Verification of Access Control Coherence in Information System during Modifications. In: Proceedings of 12th IEEE International WETICE, Austria (2003)

    Google Scholar 

  10. Poniszewska-Maranda, A., Goncalves, G., Hemery, F.: Representation of Extended RBAC Model Using UML Language. In: VojtĂĄĆĄ, P., BielikovĂĄ, M., Charron-Bost, B., SĂœkora, O. (eds.) SOFSEM 2005. LNCS, vol. 3381, pp. 413–417. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Poniszewska-Maranda, A.: Role Engineering of Information System Using Extended RBAC Model. In: Proceedings of 14th IEEE International WETICE, Sweden (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poniszewska-MaraƄda, A. (2006). Access Control Coherence of Information Systems Based on Security Constraints. In: Górski, J. (eds) Computer Safety, Reliability, and Security. SAFECOMP 2006. Lecture Notes in Computer Science, vol 4166. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875567_31

Download citation

  • DOI: https://doi.org/10.1007/11875567_31

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45762-6

  • Online ISBN: 978-3-540-45763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics