[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Skip header Section
Access Control Systems: Security, Identity Management and Trust ModelsDecember 2005
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-00445-7
Published:01 December 2005
Skip Bibliometrics Section
Reflects downloads up to 24 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

Detailing access control mechanisms that are emerging with the latest Internet programming technologies, this thorough text provides an introduction to the foundations of programming systems security, identity management, trust models, and much more.

Cited By

  1. ACM
    Wallis K, Merzinger M, Reich C and Schindelhauer C A Security Model based Authorization Concept for OPC Unified Architecture Proceedings of the 10th International Conference on Advances in Information Technology, (1-8)
  2. Ultra J and Pancho-Festin S (2017). A simple model of separation of duty for access control models, Computers and Security, 68:C, (69-80), Online publication date: 1-Jul-2017.
  3. ACM
    Martínez S, García J and Cabot J Runtime support for rule-based access-control evaluation through model-transformation Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering, (57-69)
  4. dos Santos D, Marinho R, Schmitt G, Westphall C and Westphall C (2016). A framework and risk assessment approaches for risk-based access control in the cloud, Journal of Network and Computer Applications, 74:C, (86-97), Online publication date: 1-Oct-2016.
  5. Schreuders Z, McGill T and Payne C (2013). The state of the art of application restrictions and sandboxes, Computers and Security, 32:C, (219-241), Online publication date: 1-Feb-2013.
  6. Gouglidis A and Mavridis I (2019). domRBAC, Computers and Security, 31:4, (540-556), Online publication date: 1-Jun-2012.
  7. ACM
    Elabidi A, Ben Ayed G, Mettali Gammar S and Kamoun F Towards hiding federated digital identity Proceedings of the 4th international conference on Security of information and networks, (239-242)
  8. Zhou G, Demirer M, Bayrak C and Wang L (2011). Enable delegation for RBAC with Secure Authorization Certificate, Computers and Security, 30:8, (780-790), Online publication date: 1-Nov-2011.
  9. ACM
    Mustafić T, Messerman A, Camtepe S, Schmidt A and Albayrak S Behavioral biometrics for persistent single sign-on Proceedings of the 7th ACM workshop on Digital identity management, (73-82)
  10. Gouglidis A and Mavridis I Role-based secure inter-operation and resource usage management in mobile grid systems Proceedings of the 5th IFIP WG 11.2 international conference on Information security theory and practice: security and privacy of mobile devices in wireless communication, (38-53)
  11. Pavlovic D Quantifying and qualifying trust Proceedings of the 7th International conference on Formal aspects of security and trust, (1-17)
  12. Candido S and Hutchinson S Detecting intrusion faults in remotely controlled systems Proceedings of the 2009 conference on American Control Conference, (4968-4973)
  13. Pavlovic D Dynamics, Robustness and Fragility of Trust Formal Aspects in Security and Trust, (97-113)
  14. ACM
    Ajayi O, Sinnott R and Stell A Dynamic trust negotiation for flexible e-health collaborations Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, (1-7)
  15. ACM
    Gadelha L and Schulze B On the management of grid credentials Proceedings of the 5th international workshop on Middleware for grid computing: held at the ACM/IFIP/USENIX 8th International Middleware Conference, (1-6)
  16. Ali B, Villegas W and Maheswaran M A trust based approach for protecting user data in social networks Proceedings of the 2007 conference of the center for advanced studies on Collaborative research, (288-293)
  17. Pham Q, McCullagh A and Dawson E Consistency of user attribute in federated systems Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business, (165-177)
Contributors
  • International Business Machines

Reviews

S. Nagaraj

Computers have become part and parcel of our everyday lives. For a variety of applications, it is desirable to control access to computer systems. Checking the identity of users, agents, or computers in a network is one of the preliminary tasks before granting access to resources. Authenticating users (verifying their identities), authorizing them to perform permitted actions, ensuring nonrepudiation of action (prevention of denial of participation in a transaction), and guaranteeing confidentiality and integrity of data in transactions constitute the fundamental requirements for ensuring the security of transactions. This book on access control systems centers on security, identity management, and trust models. The book may be read by anyone with an interest in computer security; however, the advanced topics in the book require a strong background in computer security. Eight chapters comprise the book. Chapter 1 introduces the basics of security and access control. The author touches on the elements of systems security, identification and authentication of entities, and the management of passwords in a reliable manner. The chapter introduces access control policies, models, and mechanisms. Access control paradigms, role-based access control, delegation, masquerading, trust, and assurance are the main topics in this chapter. Some security-design principles are also highlighted. Chapter 2 introduces models for managing identity. It discusses local identity, network identity, federated identity, and concepts such as global Web identity. The extensible name service (XNS) approach to global Web identity is also mentioned; XNS is a protocol, based on Extensible Markup Language (XML), for discovering and linking together identities that enter into a Web transaction. The chapter includes a discussion of centralized enterprise-level identity management. Chapter 3 concentrates on the elements of trust paradigms in computing. Third-party approaches for managing trust are discussed with the Kerberos protocol as an illustrative example. Public key infrastructure (PKI) and its use for trust establishment are also mentioned here. In addition, the chapter includes information about attribute certificates. Attribute certificates are data constructs similar to public key certificates; when compared to public key certificates, the attribute certificates do not contain a public key. The chapter includes examples of trust management mechanisms on the World Wide Web. In this context, security in Web services, Security Assertion Markup Language (SAML), and Web cookies are also touched upon. Chapter 4 deals with mandatory access control models. The theory of mandatory access control is introduced, along with two important models: the Bell-LaPadula model and the Biba model. The author compares the two models, and focuses on issues related to their implementation. The author concludes the chapter by citing a security model known as the "Chinese wall policy." Chapter 5 concentrates on discretionary access control and the access-matrix model. Implementation considerations and the safety aspects of the access-matrix model are also studied. Chapter 6 looks at a security model known as the take-grant protection model. The author includes its definition and debates its security aspects. Chapter 7 is on the schematic protection model. Rules of operation related to the model are presented along with its applications. Chapter 8 is the last chapter of the book. It studies role-based access control (RBAC). This chapter discusses basic RBAC and hierarchical RBAC. A comparative discussion of RBAC is also included in the chapter. The chapter studies flow analysis and separation of duty in RBAC. Consistency properties that should hold in RBAC systems are also presented. The author concludes the chapter by analyzing mechanisms for functional specification for RBAC. The book includes adequate references and a handy index. Many of the references are up to date and closely connected with the subject matter of the book. The coverage of topics in the book is satisfactory. The book will be useful for those who wish to go deep into mechanisms for access control. It may be used for advanced courses in information security. Practitioners and university students are likely to benefit from reading it. On the negative side, the book has conspicuous typographical errors (for example, Kerberos is misspelled as Kerbers in chapter 3). Although the author did include a few examples from IBM products, including many more real-world examples would have made the presentation less drab. The author could have highlighted important open problems and challenging issues in the field (for example, alternatives to access control lists) and looked at directions for future research. Nevertheless, I recommend this book as a useful reference book for access control. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations