1. Secure interoperability with O2O contracts
- Author
-
Coma-Brebel, Céline, Cuppens-Bouhlahia, Nora, Cuppens, Frédéric, Département Logique des Usages, Sciences sociales et Sciences de l'Information (LUSSI), Institut Mines-Télécom [Paris] (IMT)-Télécom Bretagne-Université européenne de Bretagne - European University of Brittany (UEB), Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (UMR 3192) (Lab-STICC), Université européenne de Bretagne - European University of Brittany (UEB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), Lab-STICC_TB_CID_SFIIS, Université de Brest (UBO)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université européenne de Bretagne - European University of Brittany (UEB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Brestois du Numérique et des Mathématiques (IBNM), and Télécom Bretagne, Bibliothèque
- Subjects
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,Organization to organization ,Design by contract ,Secure interoperability ,[INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR] - Abstract
International audience; The evolution of markets and the high volatility of business requirements put an increasingemphasis on the ability for systems to accommodate the changes required by neworganizational needs while maintaining security objectives satisfiability. This is even moretrue in case of collaboration and interoperability between different organizations and thus between their information systems. Usual solutions do not anticipate interoperability security requirements or do it in a non satisfactory way. In this chapter, we propose a contract and compatibility principles within a formal framework O2OSecure to achieve a secure interoperation.Contracts are used to explicitly represent the rules that determine the way interactionbetween organizations must be controlled to satisfy secure accesses to resources. Compatibility relations make it possible to derive interoperability security policies. We specify all the wheelwork of interoperation between organizations which might manage their security policies using access control model RBAC and/or OrBAC.Furthermore, as interoperation may lead to a lot of exchanges of information beforeand during the interoperability session, in particular those related to credentials and securitypolicies, we propose to ensure privacy protection to use the O2O licence administrativeview and an XML block based access control technique to obfuscate some of the informationexchanged.
- Published
- 2010