Managing XACML Systems in Distributed Environments through Meta-Policies

Policy-based authorization systems have been largely deployed nowadays to control different privileges over a big amount of resources within a security domain. With policies it is possible to reach a fine-grained level of expressiveness to state proper responses of a system against multiple access c...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2015
Institución:
Universidad del Rosario
Repositorio:
Repositorio EdocUR - U. Rosario
Idioma:
eng
OAI Identifier:
oai:repository.urosario.edu.co:10336/28106
Acceso en línea:
https://doi.org/10.1016/j.cose.2014.10.004
https://repository.urosario.edu.co/handle/10336/28106
Palabra clave:
XACMLAccess control system
Distributed environments
SAMLAccess control policy
Policy management
Rights
License
Restringido (Acceso a grupos específicos)
id EDOCUR2_4c2f01382797517ecece32d256a62df9
oai_identifier_str oai:repository.urosario.edu.co:10336/28106
network_acronym_str EDOCUR2
network_name_str Repositorio EdocUR - U. Rosario
repository_id_str
spelling 1061695713600c1fc4eb8-7c03-4cd6-91e2-1cda74090326-11a62cb38-58e4-4d73-8980-52134ff498e4-1d69e31ab-85df-4ddb-9216-bef85db91deb-12020-08-19T14:45:48Z2020-08-19T14:45:48Z2015-01-02Policy-based authorization systems have been largely deployed nowadays to control different privileges over a big amount of resources within a security domain. With policies it is possible to reach a fine-grained level of expressiveness to state proper responses of a system against multiple access control requests. In this context, XACML has achieved a big popularity between both industry and academy as a standard for the definition of access control policies, as well as an architecture for the evaluation of authorization requests and for the issuing of authorization decisions. However, the applicability of XACML is still not clear in collaborative and distributed environments composed of several security domains sharing the access control over some specific resources. Such a circumstance manifests when many security domains can simultaneously define the behavior that a resource will have upon received authorization requests, like for instance an organization with many subsidiaries, a company with a service virtualization business model, etc. In this paper we propose a solution to reach an effective distributed policy management considering that a number of policies in one domain may be confidential. To this end, the default XACML architecture has been redefined in order to use i) Master and Slave PAPs to communicate security domains, ii) Meta-Policies to define privileges over access control policies (the policies become the managed resources) and iii) SAML extensions to protect the policy management messages which flow between security domains. The experiments and the defined scenarios in the paper prove the validity of the proposed solution.application/pdfhttps://doi.org/10.1016/j.cose.2014.10.004ISSN: 0167-4048https://repository.urosario.edu.co/handle/10336/28106engElsevier11592Computers and SecurityVol. 48Computers and Security, ISSN:0167-4048, Vol.48 (February, 2015); pp. 92-115https://www.sciencedirect.com/science/article/pii/S0167404814001503Restringido (Acceso a grupos específicos)http://purl.org/coar/access_right/c_16ecComputers and Securityinstname:Universidad del Rosarioreponame:Repositorio Institucional EdocURXACMLAccess control systemDistributed environmentsSAMLAccess control policyPolicy managementManaging XACML Systems in Distributed Environments through Meta-PoliciesGestión de sistemas XACML en entornos distribuidos mediante metapolíticasarticleArtículohttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_6501Díaz López, Daniel OrlandoDólera Tormo,GinésMármol Gómez, FélixMartínez Pérez, Gregorio10336/28106oai:repository.urosario.edu.co:10336/281062021-06-03 00:51:10.838https://repository.urosario.edu.coRepositorio institucional EdocURedocur@urosario.edu.co
dc.title.spa.fl_str_mv Managing XACML Systems in Distributed Environments through Meta-Policies
dc.title.TranslatedTitle.spa.fl_str_mv Gestión de sistemas XACML en entornos distribuidos mediante metapolíticas
title Managing XACML Systems in Distributed Environments through Meta-Policies
spellingShingle Managing XACML Systems in Distributed Environments through Meta-Policies
XACMLAccess control system
Distributed environments
SAMLAccess control policy
Policy management
title_short Managing XACML Systems in Distributed Environments through Meta-Policies
title_full Managing XACML Systems in Distributed Environments through Meta-Policies
title_fullStr Managing XACML Systems in Distributed Environments through Meta-Policies
title_full_unstemmed Managing XACML Systems in Distributed Environments through Meta-Policies
title_sort Managing XACML Systems in Distributed Environments through Meta-Policies
dc.subject.keyword.spa.fl_str_mv XACMLAccess control system
Distributed environments
SAMLAccess control policy
Policy management
topic XACMLAccess control system
Distributed environments
SAMLAccess control policy
Policy management
description Policy-based authorization systems have been largely deployed nowadays to control different privileges over a big amount of resources within a security domain. With policies it is possible to reach a fine-grained level of expressiveness to state proper responses of a system against multiple access control requests. In this context, XACML has achieved a big popularity between both industry and academy as a standard for the definition of access control policies, as well as an architecture for the evaluation of authorization requests and for the issuing of authorization decisions. However, the applicability of XACML is still not clear in collaborative and distributed environments composed of several security domains sharing the access control over some specific resources. Such a circumstance manifests when many security domains can simultaneously define the behavior that a resource will have upon received authorization requests, like for instance an organization with many subsidiaries, a company with a service virtualization business model, etc. In this paper we propose a solution to reach an effective distributed policy management considering that a number of policies in one domain may be confidential. To this end, the default XACML architecture has been redefined in order to use i) Master and Slave PAPs to communicate security domains, ii) Meta-Policies to define privileges over access control policies (the policies become the managed resources) and iii) SAML extensions to protect the policy management messages which flow between security domains. The experiments and the defined scenarios in the paper prove the validity of the proposed solution.
publishDate 2015
dc.date.created.spa.fl_str_mv 2015-01-02
dc.date.accessioned.none.fl_str_mv 2020-08-19T14:45:48Z
dc.date.available.none.fl_str_mv 2020-08-19T14:45:48Z
dc.type.eng.fl_str_mv article
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.spa.spa.fl_str_mv Artículo
dc.identifier.doi.none.fl_str_mv https://doi.org/10.1016/j.cose.2014.10.004
dc.identifier.issn.none.fl_str_mv ISSN: 0167-4048
dc.identifier.uri.none.fl_str_mv https://repository.urosario.edu.co/handle/10336/28106
url https://doi.org/10.1016/j.cose.2014.10.004
https://repository.urosario.edu.co/handle/10336/28106
identifier_str_mv ISSN: 0167-4048
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.citationEndPage.none.fl_str_mv 115
dc.relation.citationStartPage.none.fl_str_mv 92
dc.relation.citationTitle.none.fl_str_mv Computers and Security
dc.relation.citationVolume.none.fl_str_mv Vol. 48
dc.relation.ispartof.spa.fl_str_mv Computers and Security, ISSN:0167-4048, Vol.48 (February, 2015); pp. 92-115
dc.relation.uri.spa.fl_str_mv https://www.sciencedirect.com/science/article/pii/S0167404814001503
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_16ec
dc.rights.acceso.spa.fl_str_mv Restringido (Acceso a grupos específicos)
rights_invalid_str_mv Restringido (Acceso a grupos específicos)
http://purl.org/coar/access_right/c_16ec
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Elsevier
dc.source.spa.fl_str_mv Computers and Security
institution Universidad del Rosario
dc.source.instname.none.fl_str_mv instname:Universidad del Rosario
dc.source.reponame.none.fl_str_mv reponame:Repositorio Institucional EdocUR
repository.name.fl_str_mv Repositorio institucional EdocUR
repository.mail.fl_str_mv edocur@urosario.edu.co
_version_ 1814167652375986176