Abstract
Although the development and expansion for the time-based RBAC policy has enhanced the security greatly, there are hardly any paper paying attention to the conflicts that produced by the time feature in multi-domain RBAC model. In this paper, we focus on temporal constraints and the role inheritance constraints that occurred in the inter-operation domains based on Petri nets. The approach can check whether an inter-domain access requirement has violated its local RBAC policy or the inter-domain access control policy has improper temporal constraints. In order to illustrate this approach, an applicable example is shown for the specification and conflict detection.
This work was financially supported by National Natural Science Foundation of China with Grants No. 61370216, No. 11071271, No. 11371004 and No. 61100191, and Shenzhen Strategic Emerging Industries Program with Grants No. ZDSY20120613125016389, No. JCYJ20120613151201451 and No. JCYJ20130329153215152. And also Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under project HIT.NSFIR.2011128.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (2005)
Rakkay, H., Boucheneb, H.: Security analysis of role based access control models using colored Petri nets and CPNtools. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 149–176. Springer, Heidelberg (2009)
Huang, H.J., Kirchner, H., Liu, S.Y., Wu, W.L.: Handling inheritance violation for secure interoperation of heterogeneous systems. Int. J. Secure. Network. 9(4), 223–233 (2009)
Kadloul, L., Djouani, K., Tfaili, W.: Using timed colored Petri nets and CPN-tool to model and verify TRBAC security policies. In: Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems, VECoS 2010 (2010)
Shafiq, B., Joshi, B.D., Bertino, E., Ghafoor, A.: Secure interoperation in a multi domain environment employing RBAC policies. IEEE Trans. Knowl. Data Eng. 12(3), 203–210 (2010)
Huang, H.J., Kirchner, H.: Secure interoperation design in multi-domains environments based on colored Petri nets. Inf. Sci. 221, 591–606 (2013)
Joshi, J.B.D., Bertino, E., Latif, U.: Generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng. 17(1), 4–23 (2005)
Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bao, N., Huang, H., Du, H. (2014). Keynote: Specification and Conflict Detection for GTRBAC in Multi-domain Environment. In: Lohmann, N., Song, M., Wohed, P. (eds) Business Process Management Workshops. BPM 2013. Lecture Notes in Business Information Processing, vol 171. Springer, Cham. https://doi.org/10.1007/978-3-319-06257-0_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-06257-0_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06256-3
Online ISBN: 978-3-319-06257-0
eBook Packages: Computer ScienceComputer Science (R0)