Skip to main content
Kent Academic Repository

Application of Self-Adaptive techniques to federated authorization models

Bailey, Christopher J. (2012) Application of Self-Adaptive techniques to federated authorization models. In: 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium. . pp. 1495-1498. , 2012 International Conference on Software Engineering (ICSE 2012) Doctoral Symposium (doi:10.1109/ICSE.2012.6227053) (KAR id:38730)

PDF (self-adaptation, model driven engineering, authorization, computing security)
Language: English
Download this file
(PDF/275kB)
[thumbnail of self-adaptation, model driven engineering, authorization, computing security]
Preview
Request a format suitable for use with assistive technology e.g. a screenreader
Official URL:
http://dx.doi.org/10.1109/ICSE.2012.6227053

Abstract

Authorization infrastructures are an integral part of any network where resources need to be protected. As organisations start to federate access to their resources, authorization infrastructures become increasingly difficult to manage, to a point where relying only on human resources becomes unfeasible. In our work, we propose a Self-Adaptive Authorization Framework (SAAF) that is capable of monitoring the usage of resources, and controlling access to resources through the manipulation of authorization assets (e.g., authorization policies, access rights and sessions), due to the identification of abnormal usage. As part of this work, we explore the use of models for facilitating the autonomic management of federated authorization infrastructures by 1) classifying access behaviour exhibited by users, 2) modelling authorization assets, including usage, for identifying abnormal behaviour, and 3) managing authorization through the adaptation and reflection of modelled authorization assets. SAAF will be evaluated by integrating it into an existing authorization infrastructure that would allow the simulation of abnormal usage scenarios.

Item Type: Conference or workshop item (Paper)
DOI/Identification number: 10.1109/ICSE.2012.6227053
Uncontrolled keywords: self-adaptation, model driven engineering, model transformation, computing security, authorization
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
Depositing User: C. Bailey
Date Deposited: 12 Mar 2014 09:54 UTC
Last Modified: 16 Nov 2021 10:15 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/38730 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.