How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper)

Role-based access control, where object accesses are controlled by roles (or job functions) is a more feasible alternative to traditional access control mechanisms. Constraints play a critical role in realizing and providing finegrained RBAC in diverse domains such as P2P and grid computing. In this...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Adaikkalavan, R., Chakravarthy, S.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 702
container_issue
container_start_page 698
container_title
container_volume
creator Adaikkalavan, R.
Chakravarthy, S.
description Role-based access control, where object accesses are controlled by roles (or job functions) is a more feasible alternative to traditional access control mechanisms. Constraints play a critical role in realizing and providing finegrained RBAC in diverse domains such as P2P and grid computing. In this paper, we have shown how events and authorization rules are used to provide fine-grained RBAC. First, simple events are identified for the RBAC domain. Second, various event operators for modeling constraints such as precedence, non-occurrence, dependency and their combinations are introduced. Third, how event-based RBAC policies are specified using both simple and complex events are discussed. Finally, how the proposed fine-grained RBAC policies can be exploited for P2P resource management is discussed
doi_str_mv 10.1109/DEXA.2006.68
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1698433</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1698433</ieee_id><sourcerecordid>1698433</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-4f6009a897da699d1f7d70ccfe03bb89ca7c0ccc508dd19941f8046431d05ea83</originalsourceid><addsrcrecordid>eNotjE1PwkAUADd-JBLk5s3LHvVQfK-73d13MogoJCQYkMQbWbqvpgbbplsw_HtJ9DSZOYwQNwhDRKCH58nHaJgCmKFxZ6KXKusSRZidiwFZB9ZQlhqN5kL0MEsp0ejclRjE-AUASMYQYE8spvWP7Gq5jiwnB666KH0V5HK_4yiLupWrfdPUbVdWn3JZ7zh58pGDXHG-b8vu-CjvZtWh7E7pzTfc3l-Ly8LvIg_-2Rfrl8n7eJrMF6-z8WielGizLtGFASDvyAZviAIWNljI84JBbbeOcm_zk-YZuBCQSGPhQButMEDG3qm-uP37lsy8adry27fHDRpyWin1C_pkT2U</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper)</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Adaikkalavan, R. ; Chakravarthy, S.</creator><creatorcontrib>Adaikkalavan, R. ; Chakravarthy, S.</creatorcontrib><description>Role-based access control, where object accesses are controlled by roles (or job functions) is a more feasible alternative to traditional access control mechanisms. Constraints play a critical role in realizing and providing finegrained RBAC in diverse domains such as P2P and grid computing. In this paper, we have shown how events and authorization rules are used to provide fine-grained RBAC. First, simple events are identified for the RBAC domain. Second, various event operators for modeling constraints such as precedence, non-occurrence, dependency and their combinations are introduced. Third, how event-based RBAC policies are specified using both simple and complex events are discussed. Finally, how the proposed fine-grained RBAC policies can be exploited for P2P resource management is discussed</description><identifier>ISSN: 1529-4188</identifier><identifier>ISBN: 9780769526416</identifier><identifier>ISBN: 0769526411</identifier><identifier>EISSN: 2378-3915</identifier><identifier>DOI: 10.1109/DEXA.2006.68</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Authorization ; Computer science ; Costs ; Grid computing ; History ; Laboratories ; Resource management ; Security ; Time factors</subject><ispartof>17th International Workshop on Database and Expert Systems Applications (DEXA'06), 2006, p.698-702</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1698433$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2057,4049,4050,27924,54919</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1698433$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Adaikkalavan, R.</creatorcontrib><creatorcontrib>Chakravarthy, S.</creatorcontrib><title>How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper)</title><title>17th International Workshop on Database and Expert Systems Applications (DEXA'06)</title><addtitle>DEXA</addtitle><description>Role-based access control, where object accesses are controlled by roles (or job functions) is a more feasible alternative to traditional access control mechanisms. Constraints play a critical role in realizing and providing finegrained RBAC in diverse domains such as P2P and grid computing. In this paper, we have shown how events and authorization rules are used to provide fine-grained RBAC. First, simple events are identified for the RBAC domain. Second, various event operators for modeling constraints such as precedence, non-occurrence, dependency and their combinations are introduced. Third, how event-based RBAC policies are specified using both simple and complex events are discussed. Finally, how the proposed fine-grained RBAC policies can be exploited for P2P resource management is discussed</description><subject>Access control</subject><subject>Authorization</subject><subject>Computer science</subject><subject>Costs</subject><subject>Grid computing</subject><subject>History</subject><subject>Laboratories</subject><subject>Resource management</subject><subject>Security</subject><subject>Time factors</subject><issn>1529-4188</issn><issn>2378-3915</issn><isbn>9780769526416</isbn><isbn>0769526411</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjE1PwkAUADd-JBLk5s3LHvVQfK-73d13MogoJCQYkMQbWbqvpgbbplsw_HtJ9DSZOYwQNwhDRKCH58nHaJgCmKFxZ6KXKusSRZidiwFZB9ZQlhqN5kL0MEsp0ejclRjE-AUASMYQYE8spvWP7Gq5jiwnB666KH0V5HK_4yiLupWrfdPUbVdWn3JZ7zh58pGDXHG-b8vu-CjvZtWh7E7pzTfc3l-Ly8LvIg_-2Rfrl8n7eJrMF6-z8WielGizLtGFASDvyAZviAIWNljI84JBbbeOcm_zk-YZuBCQSGPhQButMEDG3qm-uP37lsy8adry27fHDRpyWin1C_pkT2U</recordid><startdate>2006</startdate><enddate>2006</enddate><creator>Adaikkalavan, R.</creator><creator>Chakravarthy, S.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2006</creationdate><title>How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper)</title><author>Adaikkalavan, R. ; Chakravarthy, S.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-4f6009a897da699d1f7d70ccfe03bb89ca7c0ccc508dd19941f8046431d05ea83</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Access control</topic><topic>Authorization</topic><topic>Computer science</topic><topic>Costs</topic><topic>Grid computing</topic><topic>History</topic><topic>Laboratories</topic><topic>Resource management</topic><topic>Security</topic><topic>Time factors</topic><toplevel>online_resources</toplevel><creatorcontrib>Adaikkalavan, R.</creatorcontrib><creatorcontrib>Chakravarthy, S.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Adaikkalavan, R.</au><au>Chakravarthy, S.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper)</atitle><btitle>17th International Workshop on Database and Expert Systems Applications (DEXA'06)</btitle><stitle>DEXA</stitle><date>2006</date><risdate>2006</risdate><spage>698</spage><epage>702</epage><pages>698-702</pages><issn>1529-4188</issn><eissn>2378-3915</eissn><isbn>9780769526416</isbn><isbn>0769526411</isbn><abstract>Role-based access control, where object accesses are controlled by roles (or job functions) is a more feasible alternative to traditional access control mechanisms. Constraints play a critical role in realizing and providing finegrained RBAC in diverse domains such as P2P and grid computing. In this paper, we have shown how events and authorization rules are used to provide fine-grained RBAC. First, simple events are identified for the RBAC domain. Second, various event operators for modeling constraints such as precedence, non-occurrence, dependency and their combinations are introduced. Third, how event-based RBAC policies are specified using both simple and complex events are discussed. Finally, how the proposed fine-grained RBAC policies can be exploited for P2P resource management is discussed</abstract><pub>IEEE</pub><doi>10.1109/DEXA.2006.68</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1529-4188
ispartof 17th International Workshop on Database and Expert Systems Applications (DEXA'06), 2006, p.698-702
issn 1529-4188
2378-3915
language eng
recordid cdi_ieee_primary_1698433
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Authorization
Computer science
Costs
Grid computing
History
Laboratories
Resource management
Security
Time factors
title How to Use Events and Rules for Supporting Role-Based Security? (Invited Paper)
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-08T08%3A25%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=How%20to%20Use%20Events%20and%20Rules%20for%20Supporting%20Role-Based%20Security?%20(Invited%20Paper)&rft.btitle=17th%20International%20Workshop%20on%20Database%20and%20Expert%20Systems%20Applications%20(DEXA'06)&rft.au=Adaikkalavan,%20R.&rft.date=2006&rft.spage=698&rft.epage=702&rft.pages=698-702&rft.issn=1529-4188&rft.eissn=2378-3915&rft.isbn=9780769526416&rft.isbn_list=0769526411&rft_id=info:doi/10.1109/DEXA.2006.68&rft_dat=%3Cieee_6IE%3E1698433%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1698433&rfr_iscdi=true