Security Assurance for Dynamic Role Mapping in a Multi-Domain Environment

Author(s):  
Cuihua Zuo ◽  
Ruixuan Li ◽  
Hongmu Han ◽  
Zhengding Lu
Author(s):  
Lijuan Diao ◽  
Wei She ◽  
I-Ling Yen ◽  
Junzhong Gu

2021 ◽  
Vol 26 (4) ◽  
Author(s):  
Mazen Mohamad ◽  
Jan-Philipp Steghöfer ◽  
Riccardo Scandariato

AbstractSecurity Assurance Cases (SAC) are a form of structured argumentation used to reason about the security properties of a system. After the successful adoption of assurance cases for safety, SAC are getting significant traction in recent years, especially in safety-critical industries (e.g., automotive), where there is an increasing pressure to be compliant with several security standards and regulations. Accordingly, research in the field of SAC has flourished in the past decade, with different approaches being investigated. In an effort to systematize this active field of research, we conducted a systematic literature review (SLR) of the existing academic studies on SAC. Our review resulted in an in-depth analysis and comparison of 51 papers. Our results indicate that, while there are numerous papers discussing the importance of SAC and their usage scenarios, the literature is still immature with respect to concrete support for practitioners on how to build and maintain a SAC. More importantly, even though some methodologies are available, their validation and tool support is still lacking.


2014 ◽  
Vol 519-520 ◽  
pp. 181-184
Author(s):  
Jian Feng Lu ◽  
Xuan Yan ◽  
Yi Ding Liu

Role mapping is a basic technique for facilitating interoperation in RBAC-based collaborating environments. However, role mapping lacks the flexibility to specify access control policies in the scenarios where the access control is not a simple action, but consists of a sequence of actions and events from subjects and system. In this paper, we propose an attribute mapping technique to establish secure context in multi-domain environments. We first classify attributes into eight types and show that only two types of attributes need to be translated. We second give the definition of attribute mapping technique, and analysis the properties of attribute mapping. Finally, we study how cardinality constraint violation arises and shows that it is efficient to resolve this security violation.


Food Research ◽  
2020 ◽  
Vol 4 (S1) ◽  
pp. 1-11
Author(s):  
M.A. Abd Razak ◽  
M.A. Ramli ◽  
M.A. Jamaludin

The approaching of megatrend 2050, challenges have emerged in the food sector and it is predicted that main issues would be the shortage of food supply and food contamination. In parallel to the Food and Agricultural Organization (FAO), that by 2050, with the increasing human population, the food supply would be affected as the sources are inadequate to cater. This crisis requires a comprehensive solution – necessitate a better food security policy, food safety and food defence. In other words, a focused policy that deals with safe food ecosystem must be implemented and strengthen by relevant authorities. In the Malaysian context, the National Safety Policy (2017) outlined the security assurance for the nation’s food supply under Strategy 17. However, the focus of the policy is only on the preparedness of rice commodity that needs to be adequate, whereas, newer threats is making their way beyond that scope. Therefore, this review will discuss the potential of food terrorism, its concept and implication within the halal ecosystem. To achieve this objective, this study is qualitatively carried out by utilizing fully library research relating to food terrorism. The data is being analysed to conclude the findings. Based on the study, we found that food terrorism is indeed a real threat jeopardizing consumer safety, and moreover, causing negative implications towards the local, regional and global halal ecosystem. Therefore, proactive measures needed to be taken to ensure the security of food and this aligned with the objective of sharia to preserve human’s life by having adequate, nutritious, halal and safe food.


Sign in / Sign up

Export Citation Format

Share Document