Abstract
In this paper we propose a model that simplifies distributed roles management in cooperating educational organizations by creating group/role relationships to protect Web resources. Organizations share their user and group data with each other through a common communication protocol using XML-RPC.
Arranging users into groups and roles makes it easier to grant or deny permissions to many users at once. We argue that our model may be used across organizations, based on the group structure and independent collaborative administration and because it provides a high level of flexibility and usability.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Kahtani, M., Sandhu, R.: Rule-based RBAC with negative authorization. In: 20th Annual Computer Security Applications Conference, Arizona (2004)
Andress, M.: Access control. Information security magazine (April 2001)
Barka, E., Sandhu, R.: Role-based delegation model/ hierarchical roles. In: 20th Annual Computer Security Applications Conference, Arizona (2004)
Barkley, J., Beznosov, K., Uppal, J.: Supporting relationships in access control using Role Based Access Control. In: Fourth ACM Workshop on Role-Based Access Control (1999)
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal Role-Based Access Control model. ACM Tr. on ISS 3(3), 191–223 (2001)
Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.B.D.: XML-based specification for Web services document security. IEEE Computer 37(4) (2004)
Chou, S.-C.: L nRBAC: A multiple-levelled Role-Based Access Control model for protecting privacy in object-oriented systems. J. of Object Technology 3(3), 91–120 (2004)
Dowling, J., Cahill, V.: Self-managed decentralised systems using K-components and collaborative reinforcement learning. In: Proceedings of the Workshop on Self-Managed Systems (WOSS 2004), pp. 41–49 (2004)
Ferraiolo, D., Cugini, J., Kuhn, D.R.: Role-Based Access Control (RBAC): Features and motivations. In: 1995 Computer Security Applications Conference, pp. 241–248 (1995)
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R.D., Chandramouli, R.: Proposed NIST standard for Role-Based Access Control. ACM Transactions on Information and System Security (TISSEC) 4(3), 224–274 (2001)
Ferraiolo, D., Kuhn., D.R., Chandramouli, R.: Role-Based Access Control. Artech House, Computer Security Series (2003)
Guerin, T., Lord, R.: RBAC identity management (2003), http://www.portalsmag.com/articles/default.asp?ArticleID=4923
Schwoon, S., Jha, S., Reps, T., Stubblebine, S.: On generalized authorization problems. In: Proc. 16th IEEE Computer Security Foundations Workshop, Asilomar, Pacific Grove, CA, June 30 - July 2, 2003, pp. 202–218 (2003)
Simon, R., Zurko, M.: Separation of duty in role-based environments. In: Proceedings of 10th IEEE Computer Security Foundations Workshop, Rockport, Mass., pp. 183–194 (June 1997)
Strembeck, M.: Conflict checking of separation of duty constraints in RBAC-implementation experiences, http://wi.wu-wien.ac.at/home/mark/publications/se2004.pdf
Strembeck, M., Neumann, G.: An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Transactions on Information and System Security 7(3), 392–427 (2004)
Zhang, X., Park, J., Sandhu, R.: Schema based XML security: RBAC approach. In: Seventeenth IFIP 11.3 Working Conference on Data and Application Security, Estes Park, Colorado, USA, August 4-6 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Encheva, S., Tumin, S. (2006). Sharing Protected Web Resources Using Distributed Role-Based Modeling. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds) Frontiers of WWW Research and Development - APWeb 2006. APWeb 2006. Lecture Notes in Computer Science, vol 3841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11610113_47
Download citation
DOI: https://doi.org/10.1007/11610113_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-31142-3
Online ISBN: 978-3-540-32437-9
eBook Packages: Computer ScienceComputer Science (R0)