118,786 research outputs found

    SoDA : a model for the administration of separation of duty requirements in workflow systems

    Get PDF
    The increasing reliance on information technology to support business processes has emphasised the need for information security mechanisms. This, however, has resulted in an ever-increasing workload in terms of security administration. Security administration encompasses the activity of ensuring the correct enforcement of access control within an organisation. Access rights and their allocation are dictated by the security policies within an organisation. As such, security administration can be seen as a policybased approach. Policy-based approaches promise to lighten the workload of security administrators. Separation of duties is one of the principles cited as a criterion when setting up these policy-based mechanisms. Different types of separation of duty policies exist. They can be categorised into policies that can be enforced at administration time, viz. static separation of duty requirements and policies that can be enforced only at execution time, viz. dynamic separation of duty requirements. This dissertation deals with the specification of both static separation of duty requirements and dynamic separation of duty requirements in role-based workflow environments. It proposes a model for the specification of separation of duty requirements, the expressions of which are based on set theory. The model focuses, furthermore, on the enforcement of static separation of duty. The enforcement of static separation of duty requirements is modelled in terms of invariant conditions. The invariant conditions specify restrictions upon the elements allowed in the sets representing access control requirements. The sets are themselves expressed as database tables within a relational database management system. Algorithms that stipulate how to verify the additions or deletions of elements within these sets can then be performed within the database management system. A prototype was developed in order to demonstrate the concepts of this model. This prototype helps demonstrate how the proposed model could function and flaunts its effectiveness

    Benefits of Location-Based Access Control:A Literature Study

    Get PDF
    Location-based access control (LBAC) has been suggested as a means to improve IT security. By 'grounding' users and systems to a particular location, \ud attackers supposedly have more difficulty in compromising a system. However, the motivation behind LBAC and its potential benefits have not been investigated thoroughly. To this end, we perform a structured literature review, and examine the goals that LBAC can potentially fulfill, \ud the specific LBAC systems that realize these goals and the context on which LBAC depends. Our paper has four main contributions:\ud first we propose a theoretical framework for LBAC evaluation, based on goals, systems and context. Second, we formulate and apply criteria for evaluating the usefulness of an LBAC system. Third, we identify four usage scenarios for LBAC: open areas and systems, hospitals, enterprises, and finally data centers and military facilities. Fourth, we propose directions for future research:\ud (i) assessing the tradeoffs between location-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and \ud (iii) formulating design criteria for facilities and working environments for optimal LBAC usage

    A secure, constraint-aware role-based access control interoperation framework

    Get PDF
    With the growing needs for and the benefits of sharing resources and information among different organizations, an interoperation framework that automatically integrates policies to facilitate such cross-domain sharing in a secure way is becoming increasingly important. To avoid security breaches, such policies must enforce the policy constraints of the individual domains. Such constraints may include temporal constraints that limit the times when the users can access the resources, and separation of duty (SoD) constraints. Existing interoperation solutions do not address such cross-domain temporal access control and SoDs requirements. In this paper, we propose a role-based framework to facilitate secure interoperation among multiple domains by ensuring the enforcement of temporal and SoD constraints of individual domains. To support interoperation, we do not modify the internal policies, as most of the current approaches do. We present experimental results to demonstrate our proposed framework is effective and easily realizable. © 2011 IEEE

    The Psychological Needs of U.S. Military Service Members and Their Families: A Preliminary Report

    Get PDF
    Since September 11, 2001, American military service personnel and their families have endured challenges and stressful conditions that are unprecedented in recent history, including unrelenting operational demands and recurring deployments in combat zones. In response to concerns raised by members of the military community, the American Psychological Association (APA) President, Dr. Gerald Koocher, established the Task Force on Military Deployment Services for Youth, Families and Service Members in July of 2006. This Task Force was charged with: identifying the psychological risks and mental health-related service needs of military members and their families during and after deployment(s); developing a strategic plan for working with the military and other organizations to meet those needs; and constructing a list of current APA resources available for military members and families, as well as additional resources that APA might develop or facilitate in order to meet the needs of this population. At present, 700,000 children in America have at least one parent deployed. Having a primary caretaker deployed to a war zone for an indeterminate period is among the more stressful events a child can experience. Adults in the midst of their own distress are often anxious and uncertain about how to respond to their children's emotional needs. The strain of separation can weigh heavily on both the deployed parent and the caretakers left behind. Further, reintegration of an absent parent back into the family often leads to complicated emotions for everyone involved. This Task Force was established to examine such potential risks to the psychological well-being of service members and their families, acknowledging the changing context and impact of the deployment cycle, and to make preliminary recommendations for change and further review at the provider, practice, program, and policy levels. To meet the Task Force charge, we will first provide an overview of what is currently known about the impact of military deployments on service members and their families (spouses, children and significant others). In addition, we will discuss a number of programs that have been developed to meet the mental health needs of service members and their families, and we will describe the significant barriers to receiving mental health care within the Department of Defense (DoD) and Veterans Affairs (VA) system. Finally, we will offer several general recommendations for improving the psychological care offered to service members and their Military Deployment Services TF Report 5 families, and we will outline some specific proposals for how existing APA programs and resources can be employed or modified to support military communities

    Caching and Auditing in the RPPM Model

    Full text link
    Crampton and Sellwood recently introduced a variant of relationship-based access control based on the concepts of relationships, paths and principal matching, to which we will refer as the RPPM model. In this paper, we show that the RPPM model can be extended to provide support for caching of authorization decisions and enforcement of separation of duty policies. We show that these extensions are natural and powerful. Indeed, caching provides far greater advantages in RPPM than it does in most other access control models and we are able to support a wide range of separation of duty policies.Comment: Accepted for publication at STM 2014 (without proofs, which are included in this longer version

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data
    corecore