Skip to main content

Keynote: Specification and Conflict Detection for GTRBAC in Multi-domain Environment

  • Conference paper
  • First Online:
Business Process Management Workshops (BPM 2013)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 171))

Included in the following conference series:

  • 1590 Accesses

Abstract

Although the development and expansion for the time-based RBAC policy has enhanced the security greatly, there are hardly any paper paying attention to the conflicts that produced by the time feature in multi-domain RBAC model. In this paper, we focus on temporal constraints and the role inheritance constraints that occurred in the inter-operation domains based on Petri nets. The approach can check whether an inter-domain access requirement has violated its local RBAC policy or the inter-domain access control policy has improper temporal constraints. In order to illustrate this approach, an applicable example is shown for the specification and conflict detection.

This work was financially supported by National Natural Science Foundation of China with Grants No. 61370216, No. 11071271, No. 11371004 and No. 61100191, and Shenzhen Strategic Emerging Industries Program with Grants No. ZDSY20120613125016389, No. JCYJ20120613151201451 and No. JCYJ20130329153215152. And also Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under project HIT.NSFIR.2011128.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (2005)

    Google Scholar 

  2. Rakkay, H., Boucheneb, H.: Security analysis of role based access control models using colored Petri nets and CPNtools. In: Gavrilova, M.L., Tan, C.J.K., Moreno, E.D. (eds.) Transactions on Computational Science IV. LNCS, vol. 5430, pp. 149–176. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Huang, H.J., Kirchner, H., Liu, S.Y., Wu, W.L.: Handling inheritance violation for secure interoperation of heterogeneous systems. Int. J. Secure. Network. 9(4), 223–233 (2009)

    Article  Google Scholar 

  4. Kadloul, L., Djouani, K., Tfaili, W.: Using timed colored Petri nets and CPN-tool to model and verify TRBAC security policies. In: Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems, VECoS 2010 (2010)

    Google Scholar 

  5. Shafiq, B., Joshi, B.D., Bertino, E., Ghafoor, A.: Secure interoperation in a multi domain environment employing RBAC policies. IEEE Trans. Knowl. Data Eng. 12(3), 203–210 (2010)

    Google Scholar 

  6. Huang, H.J., Kirchner, H.: Secure interoperation design in multi-domains environments based on colored Petri nets. Inf. Sci. 221, 591–606 (2013)

    Article  MathSciNet  Google Scholar 

  7. Joshi, J.B.D., Bertino, E., Latif, U.: Generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng. 17(1), 4–23 (2005)

    Article  Google Scholar 

  8. Jensen, K.: Coloured Petri Nets: Basic Concepts, Analysis Methods and Practical Use. Springer, Heidelberg (1997)

    Book  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hejiao Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bao, N., Huang, H., Du, H. (2014). Keynote: Specification and Conflict Detection for GTRBAC in Multi-domain Environment. In: Lohmann, N., Song, M., Wohed, P. (eds) Business Process Management Workshops. BPM 2013. Lecture Notes in Business Information Processing, vol 171. Springer, Cham. https://doi.org/10.1007/978-3-319-06257-0_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06257-0_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06256-3

  • Online ISBN: 978-3-319-06257-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics