2013
DOI: 10.1016/j.ins.2012.09.027
|View full text |Cite
|
Sign up to set email alerts
|

Secure interoperation design in multi-domains environments based on colored Petri nets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(10 citation statements)
references
References 27 publications
0
10
0
Order By: Relevance
“…Content leakage is the major problem of sharing between distributed domains. Hejiao Huang, Helene Kirchner [4] clearly mentioned the access control policies, which integrated that allow users of one company to interact with other domains. The main challenge of policy integration is detecting the conflicts.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Content leakage is the major problem of sharing between distributed domains. Hejiao Huang, Helene Kirchner [4] clearly mentioned the access control policies, which integrated that allow users of one company to interact with other domains. The main challenge of policy integration is detecting the conflicts.…”
Section: Related Workmentioning
confidence: 99%
“…The main challenge of policy integration is detecting the conflicts. They use the designing model called colored Petri nets for identifying and verifying a secure interoperation design [4]. This model is helpful in our proposed model for verifying policy integration and yet it is major challenging issue because of frequent changes in dynamic environment.…”
Section: Related Workmentioning
confidence: 99%
“…Coloured Petri net (CPN) [25][26][27][28], in which groups of objects is thus distinguished by colour, inherits all the advantages of classical Petri net. e wide practical application distributes on the direction of distributed control systems [29] and domains environments [30]. Recently, a novel of theoretical results has been done on the application of Petri nets for NCSs [31,32].…”
Section: Introductionmentioning
confidence: 99%
“…In the cross-domain created via role mapping, several constraints in the local domain may be ignored. They cause the following: 1-Role hierarchy violation: if two roles have no inheritance relation in the local domain but there is a path in hierarchy of the crossing domain between them [1,2,4].…”
Section: Introductionmentioning
confidence: 99%
“…* Correspondence: motameni@iausari.ac.ir 3-Cardinality: in RBAC, we can consider a numerical restriction for every user or role. For example, a user u with cardinality u n means that the number of roles simultaneously authorized for u cannot exceed u n while role r with cardinalityr n means that the number of users simultaneously assigned to r cannot exceed r n [1,6].…”
Section: Introductionmentioning
confidence: 99%