LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Bailey, Christopher J. (2012)
Languages: English
Types: Unknown
Subjects: QA76
Authorization infrastructures are an integral part of any network where resources need to be protected. As organisations start to federate access to their resources, authorization infrastructures become increasingly difficult to manage, to a point where relying only on human resources becomes unfeasible. In our work, we propose a Self-Adaptive Authorization Framework (SAAF) that is capable of monitoring the usage of resources, and controlling access to resources through the manipulation of authorization assets (e.g., authorization policies, access rights and sessions), due to the identification of abnormal usage. As part of this work, we explore the use of models for facilitating the autonomic management of federated authorization infrastructures by 1) classifying access behaviour exhibited by users, 2) modelling authorization assets, including usage, for identifying abnormal behaviour, and 3) managing authorization through the adaptation and reflection of modelled authorization assets. SAAF will be evaluated by integrating it into an existing authorization infrastructure that would allow the simulation of abnormal usage scenarios.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] ANSI. ÒInformation technology Ð Role Based Access ControlÓ. ANSI INCITS 359-2004.
    • [2] ITU-T Rec X.812 (1995) | ISO/IEC 10181-3:1996 ÒSecurity Frameworks for open systems: Access control frameworkÓ.
    • [3] A.P. Moore, D.M. Cappelli, T.C. Caron, E. Shaw, D. Spooner and R.F. Trzeciak, ÒA preliminary model of insider theft of intellectual property,Ó In Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, vol. 2, 2011.
    • [4] R. Sandu and J. Park, ÒUsage Control: A Vision for Next Generation Access Control,Ó In Computer Network Security 2776, SpringerVerlag, 2003.
    • [5] H. Debar, M. Dacier and A. Wespi, ÒTowards a taxonomy of intrustion-detection systems,Ó Comput. Netw 31, Apr 1999, pp. 805- 822.
    • [6] C. Bailey, D.W. Chadwick and R. de Lemos, ÒSelf-Adaptive Authorization Framework for Policy Based RBAC/ABAC Models,Ó Proc. 9th Internationl Conference on Dependable, Autonomic and Secure Computing, (DASC 11), 2011, pp. 37-44.
    • [7] J.O. Kephart and D.M. Chess, ÒThe Vision of Autonomic Computing,Ó Computer 36, Jan. 2003, pp. 41-50.
    • [8] Y. Brun, G. M. Serugendo, C. Gacek, H. Giese, and H. Kienle, ÒEngineering Self-Adaptive Systems through Feedback Loops. In Software Engineering for Self-Adaptive Systems, Lecture Notes in Computer Science, Vol. 5525. Springer Verlag, Berlin, Heidelberg. 2009, pp. 48-70.
    • [9] R. de Lemos, H. Giese, H. A. MŸller, and M. Shaw, ÒSoftware engineering for self-adaptive systems,Ó In Dagstuhl Seminar 10431 Proceedings. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany. Dagstuhl Germany. May 2011.
    • [10] D.W. Chadwick, G. Zhao, S. Otenko, R. Laborde, L. Su and T.A. Nguyen, ÒPERMIS: A modular Authorization Infrastructure,Ó Concurrency and Computation: Practice and Experience 20, Aug. 2008, pp. 1341-1357.
    • [11] J. BŽzlvin, ÒModel Driven Engineering: An Emerging Technical Space,Ó In Generative and transformational techniques in software engineering, GTTSE 2005, LNCS 4143, 2006, pp. 36-64.
    • [12] J. Andersson, R. de Lemos, S. Malek and D. Weyns, ÒReflecting on self-adaptive software systems,Ó in Software Engineering for Adaptive and Self-Managing Systems, SEAMS, 2009, pp. 38-47.
    • [13] D. Kim, I. Ray, R. France, and N. Li, ÒModeling Role-Based Access VI. CONCLUSION Control Using Parameterized UML Models,Ó Proc. of Fundamental In the context of our Self-Adaptive Authorization Approaches to Software Engineering, 2004, pp. 180-193. Framework (SAAF), this paper has proposed the use of [14] EMn.ginAelearmin,g fRo.r TBruresutMaanndageMm.entHianfnSeErC,TÒEMTo,ÓdeJol-uDrnriavleonf SSoefctwuraitrye models as a means for automating the management Vol. 2, No. 1, 2007, pp. 47-59. © © 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article