Authorization Decision

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 6264 Experts worldwide ranked by ideXlab platform

H U Yuping - One of the best experts on this subject based on the ideXlab platform.

  • ucon a model for service grid Authorization Decision making
    Computer Engineering, 2009
    Co-Authors: Gui Jinsong, Chen Zhigang, H U Yuping
    Abstract:

    To keep free from weak capability of express of the usage control model based on Authorization predication Decision(UCONA),a delegation certification model is proposed to express Decision result in a fine-grained manner,and delegation certification processing statuses are defined to replace the simple access status.Decision component can make the reasonable delegation certification based on the system status when a request arrives,and also make Decision to change the delegation certification processing status when the system status is changed.This method effectively avoids that the same access requests generate the delegation certification repeatedly,and the delegation certification really reflects actual demands of Authorization.

Gui Jinsong - One of the best experts on this subject based on the ideXlab platform.

  • ucon a model for service grid Authorization Decision making
    Computer Engineering, 2009
    Co-Authors: Gui Jinsong, Chen Zhigang, H U Yuping
    Abstract:

    To keep free from weak capability of express of the usage control model based on Authorization predication Decision(UCONA),a delegation certification model is proposed to express Decision result in a fine-grained manner,and delegation certification processing statuses are defined to replace the simple access status.Decision component can make the reasonable delegation certification based on the system status when a request arrives,and also make Decision to change the delegation certification processing status when the system status is changed.This method effectively avoids that the same access requests generate the delegation certification repeatedly,and the delegation certification really reflects actual demands of Authorization.

X. Chen - One of the best experts on this subject based on the ideXlab platform.

  • An Access Control Model for Resource Sharing Based on the Role-Based Access Control Intended for Multi-Domain Manufacturing Internet of Things
    IEEE Access, 2017
    Co-Authors: Qian Liu, Jiafu Wan, Hong Zhang, X. Chen
    Abstract:

    Manufacturing Internet of Things (MIoT) represents the manufacturing oriented to Internet of Things with two important characteristics, resource sharing and process collaboration. Access control in resource sharing is very important for MIoT operation safety. This paper presents an access control model for resource sharing based on the role-based access control intended for multidomain MIoT. In multidomain systems, in order to response on the assigning request for permission for the certain role from the certain user, an authority action sequence named the Authorization route is employed to determine an appropriate Authorization state. In this paper, the best Authorization route with the least spread of permissions is defined as an optimal Authorization route. We employed an intelligent planning theory to model the Authorization route problem and to develop a solution algorithm called PGAO*, which can support external evaluation of both single-goal-role Authorization routes and multi-goal-role Authorization routes. In addition, some simple policies for solving the Authorization route problem are presented. The proposed access control model provides a quick and efficient Authorization Decision support for administrators in collaborative domain and ensures a secure access in resource sharing in MIoT.

Gregorio Martinezperez - One of the best experts on this subject based on the ideXlab platform.

  • dynamic counter measures for risk based access control systems
    Future Generation Computer Systems, 2016
    Co-Authors: Daniel Diazlopez, Gines Doleratormo, Felix Gomezmarmol, Gregorio Martinezperez
    Abstract:

    Risk-based access control systems are a new element in access control categories, incorporating risk analysis as part of the inputs to consider when taking an Authorization Decision. A risk analysis over a resource leads generally to temporal allocation of the resource in a risk level (e.g.?high, medium, low). Ideally, for each risk level and kind of resource, the access control system should take an Authorization Decision (expressed like a permit or deny) and the system administrator should also trigger specific counter-measures to protect resources according to their risk level. In a small access control system with few resources it is possible for an administrator to follow the risk level changes and react promptly with counter-measures; but in medium/large access control systems it is almost unfeasible to react in a customized way to thousands of risk level emergencies asking for attention. In this paper we propose the adoption of dynamic counter-measures (which can be integrated within access control policies) changing along time to face variations in the risk level of every resource, bringing two main benefits, namely: (i) a suitable resource protection according to the risk level (not under or over estimated) and (ii) an access control system granting/denying access depending on the fulfillment of a set of security controls applicable in an Authorization access request. To define the most appropriate set of counter-measures applicable for a specific situation we define a method based on genetic algorithms, which allows to find a solution in a reasonable time frame satisfying different required conditions. Finally, the conducted experiments show the applicability of our proposal in a real scenario. Finding of best sets of counter-measures to protect resources.Dynamic countermeasures to face variations in the Risk Level ( R L ) .Access depending on the fulfillment of a set of specific security controls.Method based on genetic algorithms with applicability in a real scenario.Resource protection according to the risk level (not under or overestimated).

Chen Zhigang - One of the best experts on this subject based on the ideXlab platform.

  • ucon a model for service grid Authorization Decision making
    Computer Engineering, 2009
    Co-Authors: Gui Jinsong, Chen Zhigang, H U Yuping
    Abstract:

    To keep free from weak capability of express of the usage control model based on Authorization predication Decision(UCONA),a delegation certification model is proposed to express Decision result in a fine-grained manner,and delegation certification processing statuses are defined to replace the simple access status.Decision component can make the reasonable delegation certification based on the system status when a request arrives,and also make Decision to change the delegation certification processing status when the system status is changed.This method effectively avoids that the same access requests generate the delegation certification repeatedly,and the delegation certification really reflects actual demands of Authorization.