52,817 research outputs found

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data

    My private cloud--granting federated access to cloud resources

    Get PDF
    We describe the research undertaken in the six month JISC/EPSRC funded My Private Cloud project, in which we built a demonstration cloud file storage service that allows users to login to it, by using their existing credentials from a configured trusted identity provider. Once authenticated, users are shown a set of accounts that they are the owners of, based on their identity attributes. Once users open one of their accounts, they can upload and download files to it. Not only that, but they can then grant access to their file resources to anyone else in the federated system, regardless of whether their chosen delegate has used the cloud service before or not. The system uses standard identity management protocols, attribute based access controls, and a delegation service. A set of APIs have been defined for the authentication, authorisation and delegation processes, and the software has been released as open source to the community. A public demonstration of the system is available online

    Auer Deference: Doubling Down on Delegation\u27s Defects

    Get PDF
    Together with the better-known Chevron deference rule, the doctrine articulated in Auer v. Robbins two decades ago—which makes reasonable administrative constructions of ambiguous administrative rules binding on courts in most circumstances—has become a focal point for concerns about the expanding administrative state. Auer deference, even more than Chevron deference, enlarges administrative authority in ways that are at odds with basic constitutional structures and due process requirements. Objections to Auer have provided cogent reasons for why courts should not grant deference to administrative interpretations merely because an agency’s rule is unclear. The most commonly voiced objections, however, do not explain why Congress should be disabled in all instances from granting administrators discretionary authority over rule interpretation—even in settings that do not raise serious risks of partiality or unfair surprise in administrative construction. Examining the relationship between statutorily directed deference and constitutional-structural principles clarifies the essential underlying objection to Auer and the limits of that objection. When Congress by law confers discretionary authority that does not exceed its constitutional power to delegate functions to an administrator, courts should respect that assignment of authority, unless it violates other specific constitutional commands. Yet, when delegations are at most only arguably consistent with the Constitution, extending deference—especially expanding deference as Auer does in successive determinations—exacerbates delegations’ difficulties. A reinvigorated nondelegation doctrine would solve the major Auer problem directly, and elimination of Auer-like deference would clearly be preferable to retaining the doctrine in its current form. Short of that, demanding that the statutory basis for deference is clearly articulated would provide a modest first step in cabining problems associated with constitutionally questionable delegations of lawmaking authority. Those who embrace the rule of law, whether advocates or opponents of the modern administrative state, should support that step

    Shibboleth-based access to and usage of grid resources

    Get PDF
    Security underpins grids and e-research. Without a robust, reliable and simple grid security infrastructure combined with commonly accepted security practices, large portions of the research community and wider industry will not engage. The predominant way in which security is currently addressed in the grid community is through public key infrastructures (PKI) based upon X.509 certificates to support authentication. Whilst PKIs address user identity issues, authentication does not provide fine grained control over what users are allowed to do on remote resources (authorization). In this paper we outline how we have successfully combined Shibboleth and advanced authorization technologies to provide simplified (from the user perspective) but fine grained security for access to and usage of grid resources. We demonstrate this approach through different security focused e-science projects being conducted at the National e-Science Centre (NeSC) at the University of Glasgow. We believe that this model is widely applicable and encourage the further uptake of e-science by non-IT specialists in the research communitie

    Chevron Meets Youngstown: National Security and the Administrative State

    Get PDF
    The past several years have witnessed a burst of scholarship at the intersection of national security and administrative law. Many supporters of this approach endorse a heightened, “super-strong” brand of Chevron deference to presidential decisionmaking during times of emergency. Believing that the Executive’s comparative advantage in expertise, access to information, and accountability warrant minimal judicial scrutiny, these Chevron-backers advance an Executive-centric view of national security powers. Other scholars, by contrast, dispute Chevron’s relevance to national security. These Chevron-detractors argue for an interventionist judiciary in national security matters. Both camps criticize the Supreme Court’s scaling of deference to the Executive after 9/11: Chevron-backers argue that the Court failed to accord sufficient deference to the President, while Chevron-detractors argue that the Court failed to clarify the scope of individual liberties. However, neither side appreciates the role that Justice Jackson’s seminal Youngstown concurrence has played in the Court’s resolution of recent national security cases. Youngstown makes congressional legislation – not Executive power or individual rights – the central judicial concern in cases pitting individual liberty against Executive power. The post-9/11 Supreme Court, following Justice Jackson, has used judicial review to catalyze congressional action by remanding to Congress policy questions lacking joint political branch support. This dual-branch theory of governance preserves a critical rule-of-law basis for judicial review of national security decisionmaking that Chevron’s backers and its detractors overlook
    • …
    corecore