Inter-Operability In Incompatible Access Control Models

Authors

  • Kanthi Kiran Bhargav P.V
  • Deepti Mehrotra

Keywords:

Role Based Access Control Model, Attribute Based Access Control Model, eXtensible Access Control Markup Language, Policy Segregator,Policy Generator

Abstract

Sharing of resources across an interoperable environment has it’s own fair share of pros and cons. The sharing of resources or data in an interoperable environment enhances the quality of services and the productivity among the organizations. The pros of an interoperable environment are mitigated by it’s cons. The resources and data of the organisations are under constant threat of being accessed beyond the authorization privileges specified to them. In an intra-operable environment, these threats of accessing beyond the privileges specified are nullified by defining Security Policies (SP) and implementing these defined Security Policies (SP) through Access Control Models. In an inter-operable environment, defining Security Policies (SP) for the whole environment can be a tedious and a complex task. This approach makes the system a rigid one and performs poorly while handling a large number of users/entities i.e it is not scalable. This approach will be more complex when both the organisations employ incompatible Access Control Models. A more effective approach would be to design a system which is efficient enough to make the Access Control Models in the environment compatible with each other. This can be achieved by designing a system which can dynamically generate Access Control Policies (ACPs) for a specific Access Control Model, which are compatible with the remaining Access Control Models in the environment. In this paper we focus on the inter-operability of two such models - Attribute Based Access Control Model (ABAC) and Role Based Access Control Model (RBAC).

Downloads

Download data is not yet available.

Downloads

Published

2017-07-01

How to Cite

Kanthi Kiran Bhargav P.V, & Deepti Mehrotra. (2017). Inter-Operability In Incompatible Access Control Models. Journal of Network and Innovative Computing, 5, 8. Retrieved from https://cspub-jnic.org/index.php/jnic/article/view/134

Issue

Section

Original Article