RBAC-Based Secure Interoperation Using Constraint Logic Programming

Jinwei Hu, Ruixuan Li, Zhengding Lu
2009 2009 International Conference on Computational Science and Engineering  
Secure interoperation is an increasingly important issue for large-scale enterprise applications. In this paper, we investigate, through constraint logic programming (CLP), secure interoperation in collaborating environments which employ Role-Based Access Control (RBAC) policies. In particular, we propose two types of interoperation, permission-based and the role-based secure interoperation, both formulated in CLP. Since a wide range of conflicts that may arise during interoperation, we also
more » ... eration, we also present corresponding rules for conflict resolution. By allowing permission-based and role-based interoperation, our framework enables flexible secure interoperation configuration. The proposed permission-based and the role-based secure interoperation are a pair of complementary approaches. With specification of secure interoperation in CLP, formal analysis and reasoning can be performed on RBAC-based secure interoperation.
doi:10.1109/cse.2009.249 dblp:conf/cse/HuLL09 fatcat:fntm2ucptbfqbcriid4pno5ql4