TY - JOUR
T1 - Inconsistency detection of authorization policies in distributed component environment
AU - Moon, Chang Joo
AU - In, Hoh Peter
PY - 2005
Y1 - 2005
N2 - In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are distributed to an application server on a network with their authorization policies. It is necessary to detect inconsistency between the authorization policies of the RBAC server and the distributed components to guarantee the authorization policy integrity while system configuration and policies are changing. In this paper, an inconsistency detection method between the two authorization policies is proposed. Conditions of guaranteeing consistency are investigated to detect the inconsistencies and validated in a case study.
AB - In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are distributed to an application server on a network with their authorization policies. It is necessary to detect inconsistency between the authorization policies of the RBAC server and the distributed components to guarantee the authorization policy integrity while system configuration and policies are changing. In this paper, an inconsistency detection method between the two authorization policies is proposed. Conditions of guaranteeing consistency are investigated to detect the inconsistencies and validated in a case study.
UR - http://www.scopus.com/inward/record.url?scp=23944432367&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=23944432367&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-31815-6_4
DO - 10.1007/978-3-540-31815-6_4
M3 - Conference article
AN - SCOPUS:23944432367
VL - 3325
SP - 39
EP - 50
JO - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
JF - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SN - 0302-9743
T2 - 5th International Workshop on Information Security Applications, WISA 2004
Y2 - 23 August 2004 through 25 August 2004
ER -