Abstract
Collaboration between distributed domains has become an emerging demand that allows organization to share resources and services. In order to ensure secure collaboration between them, authorization specification is required. Thus, a global access control policy should be defined. However, the combination of the collaborator’s access control policies may create authorization conflicts. In this paper, we propose a new approach based on organization’s weight \(\alpha _i \) in order to resolve potential detected policy conflicts, also we define how to calculate \(\alpha _i\) accordingly and we propose a new algorithm to resolve the detected conflicts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sandhu, R.S., Coyne, E., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Comput. 29(2), 38–47 (1996). Arch. Rat. Mech. Anal. 78, 315–333 (1982)
Burnett, C., Chen, L., Edwards, P., Norman, T.J.: TRAAC: trust and risk aware access control. In: Twelfth Annual International Conference on Privacy, Security and Trust, pp. 371–378 (2014)
Rashid, A., Kim, I.K., Khan, O.A.: Providing authorization interoperability using rule based HL7 RBAC for CDR (Clinical Data Repository) framework. In: Proceedings of the 2015 12th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2015, pp. 343–348 (2015)
Alshehri, S., Raj, R.K.: Secure access control for health information sharing systems. In: 2013 IEEE International Conference on Healthcare Informatics, pp. 277–286 (2013)
Chi, H., Jones, E.L., Zhao, L.: Implementation of a security access control model for inter-organizational healthcare information systems. In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, pp. 692–696 (2008)
Bhartiya, S., Mehrotra, D., Girdhar, A.: Proposing hierarchy-similarity based access control framework: a multilevel electronic health record data sharing approach for interoperable environment. J. King Saud Univ. Comput. Inf. Sci. (2015)
Yanhuang, L., Nora, C.B., Jean-Michel, C., Frdric, C., Vincent, F.: Reaching agreement in security policy negotiation
Elkandoussi, A., Elbakkali, H.: On access control requirements for inter-organizational workflow. In: Proceedings of the 4th Edition of National Security Days (JNS4), pp. 1–6 (2014)
Deepak, P., Mohsen, A.S., Kotagiri, R., Rajkumar, B.: A taxonomy and survey of fault-tolerant workflow management systems in cloud and distributed computing environments
Sabrina, K., Alessandra, M., Stefan, D.: Access control and the resource description framework: a survey
Duan, L., Chen, S., Zhang, Y., Liu, R.P.: Automated policy combination for data sharing across multiple organizations. In: IEEE International Conference on Services Computing, pp. 226–233 (2015)
Lin, L., Hu, J., Zhang, J.: Packet: a privacy-aware access control policy composition method for services composition in cloud environments. J. Front. Comput. Sci. 10(6), 1142–1157 (2016)
Wang, H., Sun, L., Varadharajan, V.: Purpose-based access control policies and conflicting analysis. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) Security and Privacy – Silver Linings in the Cloud. IFIP Advances in Information and Communication Technology, vol. 330, pp. 217–228. Springer, Heidelberg (2010)
Hu, H., Ahn, G.J., Jorgensen, J.: Multiparty access control for online social networks: model and mechanisms. IEEE Trans. Knowl. Data Eng. 25, 1614–1627 (2012)
Elkandoussi, A., Elbakkali, H., Elhilali, N.: Toward resolving access control policy conflict in inter-organizational workflows. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 2161–5330 (2015)
Li, W., Wu, J., Zhang, Q., Hu, K., Li, J.: Trust-driven and QoS demand clustering analysis based cloud workflow scheduling strategies. Cluster Comput. 17(3), 1013–1030 (2014)
Tan, W., Sun, Y., Li, L.X., Lu, G., Wang, T.: A trust service-oriented scheduling model for workflow applications in cloud computing. IEEE Syst. J. 8(3), 868–878 (2014)
Lin, D., Rao, P., Bertino, E., Lobo, J.: An approach to evaluate policy similarity. In: Proceedings of 12th ACM Symposium on Access Control Models and Technologies, pp. 1–10 (2007)
Shalini, B., Deepti, M., Anup, G.: Proposing hierarchy-similarity based access control framework: a multilevel electronic health record data sharing approach for interoperable environment. J. King Saud Univ. Comput. Inf. Sci. 29, 505–519 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
El Kandoussi, A., El Bakkali, H. (2018). Weighted Access Control Policies Cohabitation in Distributed Systems. In: Abraham, A., Haqiq, A., Muda, A., Gandhi, N. (eds) Innovations in Bio-Inspired Computing and Applications. IBICA 2017. Advances in Intelligent Systems and Computing, vol 735. Springer, Cham. https://doi.org/10.1007/978-3-319-76354-5_32
Download citation
DOI: https://doi.org/10.1007/978-3-319-76354-5_32
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-76353-8
Online ISBN: 978-3-319-76354-5
eBook Packages: EngineeringEngineering (R0)