Access control coherence of information systems based on security constraints

  • Authors:
  • Aneta Poniszewska-Marańda

  • Affiliations:
  • Institute of Computer Science, Technical University of Lodz, Poland

  • Venue:
  • SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security administration in an information system is a complex task. In order to be defined properly, the security policy requires formulation of a large number of security constraints. Moreover, the information system used in an enterprise should be coherent, which means that all its element, including relations between them as well as their constraints should posses this property. The objective of this paper is to present security constraints of a security schema in an information system based on the RBAC model and the methods to assure the coherence of global security schema. Starting from the global schema of the coherent security, any insertion of a new application should respect the global coherence of the new security schema being the consequence of the fusion of these two schemas.