Skip to main content

Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems

  • Conference paper
SOFSEM 2014: Theory and Practice of Computer Science (SOFSEM 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8327))

  • 1439 Accesses

Abstract

Rapid development of new technologies brings with it a need for the new security solutions. Identifying, defining and implementing of security constraints is an important part of the process of modeling and developing of application/information systems and its administration.

The paper presents the issue of security constraints of information system from the point of view of Usage Role-based Access Control approach - it deals with the classification of constraints and their implementation in the process of modeling the access rules for dynamic information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ferraiolo, D., Sandhu, R.S., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Role-Based Access control. ACM TISSEC (2001)

    Google Scholar 

  2. Park, J., Zhang, X., Sandhu, R.: Attribute Mutability in Usage Control. In: 18th IFIP WG 11.3 Working Conference on Data and Applications Security (2004)

    Google Scholar 

  3. Lazouski, A., Martinelli, F., Mori, P.: Usage control in computer security: A survey. Computer Science Review 4(2), 81–99 (2010)

    Article  Google Scholar 

  4. Pretschner, A., Hilty, M., Basin, D.: Distributed usage control. Communications of the ACM 49(9) (2006)

    Google Scholar 

  5. Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM TISSEC 8(4), 351–387 (2005)

    Article  Google Scholar 

  6. Poniszewska-Maranda, A.: Conception Approach of Access Control in Heterogeneous Information Systems using UML. Journal of Telecommunication Systems 45(2-3), 177–190 (2010)

    Article  Google Scholar 

  7. Strembeck, M., Neumann, G.: An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM TISSEC 7(3) (2004)

    Google Scholar 

  8. Bertino, E., Ferrari, E., Atluri, V.: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM TISSEC 2(1)

    Google Scholar 

  9. Poniszewska-Maranda, A.: Modeling and design of role engineering in development of access control for dynamic information systems. Bulletin of the Polish Academy of Sciences, Technical Science 61(3) (2013)

    Google Scholar 

  10. Kim, D., Solomon, M.: Fundamentals of Information Systems Security. Jones & Bartlett Learning (2012)

    Google Scholar 

  11. Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control, 2nd edn. Artech House (2007)

    Google Scholar 

  12. Hu, V.C., Ferraiolo, D.F., Kuhn, D.R.: Assessment of Access Control Systems. Interagency Report 7316, NIST (2006)

    Google Scholar 

  13. Stewart, J.M., Chapple, M., Gibson, D.: CISSP: Certified Information Systems Security Professional Study Guide, 6th edn. John Wiley & Sons (2012)

    Google Scholar 

  14. Ahn, G.-J.: The RCL 2000 language for specifying role-based authorization constraints, Ph.D. thesis, George Mason University, USA (1999)

    Google Scholar 

  15. Ahn, G.-J., Sandhu, R.S.: Role-based authorization constraints specification. ACM Trans. on Information and Systems Security 3(4), 207–226 (2000)

    Article  Google Scholar 

  16. Poniszewska-Maranda, A.: Logical security models and their implementations in information systems (in Polish). EXIT (2013)

    Google Scholar 

  17. Booch, G., Rumbaugh, J., Jacobson, I.: The Unified Modelling Language User Guide. Addison Wesley (1998)

    Google Scholar 

  18. OMG, OMG Unified Modeling Language Specification (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Poniszewska-Maranda, A. (2014). Security Constraints in Modeling of Access Control Rules for Dynamic Information Systems. In: Geffert, V., Preneel, B., Rovan, B., Å tuller, J., Tjoa, A.M. (eds) SOFSEM 2014: Theory and Practice of Computer Science. SOFSEM 2014. Lecture Notes in Computer Science, vol 8327. Springer, Cham. https://doi.org/10.1007/978-3-319-04298-5_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-04298-5_41

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-04297-8

  • Online ISBN: 978-3-319-04298-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics