A Security Violation Detection Method For Rbac Based Interoperation

Xiyuan Chen,Di Wu.,Jian Lin,Miaoliang Zhu
DOI: https://doi.org/10.1109/ICCIAS.2006.295308
2006-01-01
Abstract:To satisfy the requirements of secure interoperation among distributed systems, a security violation detection method for RBAC based interoperation is proposed We carry out the discussion in the scope of Core RBAC and Hierarchy RBAC. To better illustrate the method for RBAC based interoperation, a formal definition of secure interoperation in RBAC systems has been introduced. Security violation of interoperation with role mappings in the distributed systems is analyzed. Based on these discussions, a minimum security violation detection method for RBAC based interoperation according to the feature of RBAC system and the inherent characteristic of interoperation in distributed environment is introduced. The minimum detection method provides good performance reducing complexity by decreasing amount of roles involved in detection.
What problem does this paper attempt to address?