An approach for trusted interoperation in a multidomain environment

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There are increasing requirements for interoperation among distributed multi-domain systems. The key challenge is how to balance security and collaboration. A novel approach is proposed in this paper to support the trusted interoperation. It introduces the notions of effect scope and life condition into role based access control model to restrict permission to be active only in proper environment. Partial inheritance of role hierarchy is presented to support the finely granular access rights as well as the verification algorithms are proposed to maintain security constraints consistent. As an example, XACML-based platform is provided to combine the existent systems for secure interoperation. Without compromising the collaboration, this approach can effectively enforce a layered security policy and can reduce the complexity of security management. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Sun, Y., Pan, P., & Meng, X. (2006). An approach for trusted interoperation in a multidomain environment. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4158 LNCS, pp. 352–361). Springer Verlag. https://doi.org/10.1007/11839569_34

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free