Back to Search Start Over

Secure interoperability with O2O contracts

Authors :
Coma-Brebel, Céline
Cuppens-Bouhlahia, Nora
Cuppens, Frédéric
Département Logique des Usages, Sciences sociales et Sciences de l'Information (LUSSI)
Institut Mines-Télécom [Paris] (IMT)-Télécom Bretagne-Université européenne de Bretagne - European University of Brittany (UEB)
Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (UMR 3192) (Lab-STICC)
Université européenne de Bretagne - European University of Brittany (UEB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Brestois du Numérique et des Mathématiques (IBNM)
Université de Brest (UBO)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)
Lab-STICC_TB_CID_SFIIS
Université de Brest (UBO)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université européenne de Bretagne - European University of Brittany (UEB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Brestois du Numérique et des Mathématiques (IBNM)
Télécom Bretagne, Bibliothèque
Source :
Web-based information technologies and distributed systems, Web-based information technologies and distributed systems, 2, Atlantic Press, pp.257-291, 2010, Atlantis and pervasive intelligence, 978-9078677284
Publication Year :
2010
Publisher :
HAL CCSD, 2010.

Abstract

International audience; The evolution of markets and the high volatility of business requirements put an increasingemphasis on the ability for systems to accommodate the changes required by neworganizational needs while maintaining security objectives satisfiability. This is even moretrue in case of collaboration and interoperability between different organizations and thus between their information systems. Usual solutions do not anticipate interoperability security requirements or do it in a non satisfactory way. In this chapter, we propose a contract and compatibility principles within a formal framework O2OSecure to achieve a secure interoperation.Contracts are used to explicitly represent the rules that determine the way interactionbetween organizations must be controlled to satisfy secure accesses to resources. Compatibility relations make it possible to derive interoperability security policies. We specify all the wheelwork of interoperation between organizations which might manage their security policies using access control model RBAC and/or OrBAC.Furthermore, as interoperation may lead to a lot of exchanges of information beforeand during the interoperability session, in particular those related to credentials and securitypolicies, we propose to ensure privacy protection to use the O2O licence administrativeview and an XML block based access control technique to obfuscate some of the informationexchanged.

Details

Language :
English
ISBN :
978-90-78677-28-4
ISBNs :
9789078677284
Database :
OpenAIRE
Journal :
Web-based information technologies and distributed systems, Web-based information technologies and distributed systems, 2, Atlantic Press, pp.257-291, 2010, Atlantis and pervasive intelligence, 978-9078677284
Accession number :
edsair.dedup.wf.001..52feadc3da9f4fe0d1d53ac9c563aee7