TY - GEN
T1 - Conflict detection model of access control policy in collaborative environment
AU - Fan, Beibei
AU - Liang, Xiaoyan
AU - Luo, Yang
AU - Bo, Yang
AU - Xia, Chunhe
PY - 2011
Y1 - 2011
N2 - Cross-domain interoperation based on role-mapping increasingly becomes a representative research field of collaborative environment. However, in this collaborative environment, there would still be more permission or less than the role of role-mapping policy required when authorization, this situation can not be completely avoided. This disaccord will result in conflict of access control policies (ACPs) in collaborative domains, and ultimately lead to unauthorized access to resources in autonomy domains. A new method is presented to detect the conflict between access control policies in collaborative environment automatically. The ACPs conflict detection model (ACPCDM) is established, the termination of ACPCDM is proved by the putdown automation, and the prototype system is implemented. At last, we validate the validity of this method with experiments, the result of the experiments shows that the analysis report of conflict can not only detect if there is conflict, but also figure out the conflict type, the causes and location of the conflict. So it is much easier for administer in each domain to resolve the conflict.
AB - Cross-domain interoperation based on role-mapping increasingly becomes a representative research field of collaborative environment. However, in this collaborative environment, there would still be more permission or less than the role of role-mapping policy required when authorization, this situation can not be completely avoided. This disaccord will result in conflict of access control policies (ACPs) in collaborative domains, and ultimately lead to unauthorized access to resources in autonomy domains. A new method is presented to detect the conflict between access control policies in collaborative environment automatically. The ACPs conflict detection model (ACPCDM) is established, the termination of ACPCDM is proved by the putdown automation, and the prototype system is implemented. At last, we validate the validity of this method with experiments, the result of the experiments shows that the analysis report of conflict can not only detect if there is conflict, but also figure out the conflict type, the causes and location of the conflict. So it is much easier for administer in each domain to resolve the conflict.
KW - access control policy
KW - collaborative environment
KW - conflict detection
KW - role mapping
UR - https://www.scopus.com/pages/publications/83755220440
U2 - 10.1109/ICCIS.2011.112
DO - 10.1109/ICCIS.2011.112
M3 - 会议稿件
AN - SCOPUS:83755220440
SN - 9780769545011
T3 - Proceedings - 2011 International Conference on Computational and Information Sciences, ICCIS 2011
SP - 377
EP - 381
BT - Proceedings - 2011 International Conference on Computational and Information Sciences, ICCIS 2011
T2 - 2011 International Conference on Computational and Information Sciences, ICCIS 2011
Y2 - 21 October 2011 through 23 October 2011
ER -