Modeling access control and user actions using trust - based access control policies
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Technical University of Moldova
2020-09-01
|
Series: | Journal of Social Sciences |
Subjects: | |
Online Access: | http://ibn.idsi.md/sites/default/files/imag_file/JSS-3-2020_72-84.pdf |
id |
doaj-39b59848f75a44d8b0dc9eb13b05539c |
---|---|
record_format |
Article |
spelling |
doaj-39b59848f75a44d8b0dc9eb13b05539c2020-11-25T03:36:37ZengTechnical University of Moldova Journal of Social Sciences2587-34902587-35042020-09-0133728410.5281/zenodo.3971967Modeling access control and user actions using trust - based access control policiesDANILESCU, Marcel0https://orcid.org/0000-0002-6561-7955“Danubius” University, 3 Galati Bd., Galați 800654, RomaniaThis paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review of previous research and the presentation of the necessary conditions for accessing and applying actions on an object, published in "Data security management applying trust policies for small organizations, ad hoc organizations and virtual organizations" in 2012, this paper presents the four necessary steps, from the analysis of the manual system necessary to be automated to the determination of the access policies of the users. • Stage 1 - analysis of the existing situation - refers to the identification of actors, and actions that apply to an object. • Stage 2 - creating the computer system and optimizing the flow - presents the new, optimized system that will be implemented. • Stage 3 - dealing with exceptions - separation of duty - presents various situations that may arise during the operation of the computer system and how they should be treated. • Stage 4 - creation of the hierarchy of actions attached to the document, a model of the hierarchy of actions is presented, which will be attached to the document and can lead to the creation of access policies.http://ibn.idsi.md/sites/default/files/imag_file/JSS-3-2020_72-84.pdfanalysisapplicationsauthorizationorganizationrelationshipsworkflow |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
DANILESCU, Marcel |
spellingShingle |
DANILESCU, Marcel Modeling access control and user actions using trust - based access control policies Journal of Social Sciences analysis applications authorization organization relationships workflow |
author_facet |
DANILESCU, Marcel |
author_sort |
DANILESCU, Marcel |
title |
Modeling access control and user actions using trust - based access control policies |
title_short |
Modeling access control and user actions using trust - based access control policies |
title_full |
Modeling access control and user actions using trust - based access control policies |
title_fullStr |
Modeling access control and user actions using trust - based access control policies |
title_full_unstemmed |
Modeling access control and user actions using trust - based access control policies |
title_sort |
modeling access control and user actions using trust - based access control policies |
publisher |
Technical University of Moldova |
series |
Journal of Social Sciences |
issn |
2587-3490 2587-3504 |
publishDate |
2020-09-01 |
description |
This paper is a natural continuation of previous research on the implementation of confidentiality in small, medium, and virtual enterprises. This research began in 2009, with the work "Xml Based Techniques for Data Privacy in E-Business" which revealed that for small, medium, and virtual enterprises that often represent start-ups, trust is a basic element. Thus, in 2010, we published the paper "Control access to information by applying policies based on trust hierarchies". Present work shows a method of modeling the hierarchies of trust in computer systems. After a review of previous research and the presentation of the necessary conditions for accessing and applying actions on an object, published in "Data security management applying trust policies for small organizations, ad hoc organizations and virtual organizations" in 2012, this paper presents the four necessary steps, from the analysis of the manual system necessary to be automated to the determination of the access policies of the users. • Stage 1 - analysis of the existing situation - refers to the identification of actors, and actions that apply to an object. • Stage 2 - creating the computer system and optimizing the flow - presents the new, optimized system that will be implemented. • Stage 3 - dealing with exceptions - separation of duty - presents various situations that may arise during the operation of the computer system and how they should be treated. • Stage 4 - creation of the hierarchy of actions attached to the document, a model of the hierarchy of actions is presented, which will be attached to the document and can lead to the creation of access policies. |
topic |
analysis applications authorization organization relationships workflow |
url |
http://ibn.idsi.md/sites/default/files/imag_file/JSS-3-2020_72-84.pdf |
work_keys_str_mv |
AT danilescumarcel modelingaccesscontrolanduseractionsusingtrustbasedaccesscontrolpolicies |
_version_ |
1724549085320445952 |