Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jinwei Hu is active.

Publication


Featured researches published by Jinwei Hu.


international conference on information security and cryptology | 2007

Establishing RBAC-based secure interoperability in decentralized multi-domain environments

Jinwei Hu; Ruixuan Li; Zhengding Lu

Establishing interoperability is the first and foremost problem of secure interoperation in multi-domain environments. In this paper, we propose a framework to facilitate the establishment of secure interoperability in decentralized multi-domain environments, which employ Role-Based Access Control (RBAC) policies. In particular, we propose a method for setting up interoperating relationships between domains by combining role mappings and assignments of permissions to foreign roles. A key challenge in the establishment of secure interoperability is to guarantee security of individual domains in presence of interoperation. We present rules which regulate the interoperability. These rules ensure that constraints of RBAC policies are respected when cross-domain accesses are allowed.


international conference on information security | 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control

Jianfeng Lu; Ruixuan Li; Zhengding Lu; Jinwei Hu; Xiaopu Ma

Separation-of-Duty (SoD) policy is a fundamental security principle for prevention of fraud and errors in computer security. The research of static SoD (SSoD) policy in recently presented usage control (UCON) model has not been explored. Consequently, this paper attempts to address two important issues: the specification and enforcement of SSoD in UCON. We give a set-based specification scheme, which is simpler and more general than existing approaches. As for the enforcement, we study the problem of determining whether an SSoD policy is enforceable, and show that directly enforcing an SSoD policy is a coNP-complete problem. In indirect enforcement, we generate the least restrictive static mutually exclusive attribute (SMEA) constraints to enforce SSoD policies, by using the attribute level SSoD requirement as an intermediate step. The results are fundamental to understanding the effectiveness of using constraints to enforce SSoD policies in UCON.


international conference on information security | 2012

Compliance checking for usage-constrained credentials in trust negotiation systems

Jinwei Hu; Khaled M. Khan; Yun Bai; Yan Zhang

We propose an approach to placing usage-constraints on RT credentials; issuers specify constraints by designing non-deterministic finite automata. We show by examples that this approach can express constraints of practical interest. We present a compliance checker in the presence of usage-constraints, especially for trust negotiation systems. Given an RT policy, the checker is able to find all minimal satisfying sets, each of which uses credentials in a way consistent with given constraints. The checker leverages answer set programming, a declarative logic programming paradigm, to model and solve the problem. We also show preliminary experimental results: supporting usage-constraints on credentials incurs affordable overheads and the checker responds efficiently.


Knowledge and Information Systems | 2017

Role updating in information systems using model checking

Jinwei Hu; Khaled M. Khan; Yan Zhang; Yun Bai; Ruixuan Li

The role-based access control (RBAC) has significantly simplified the management of users and permissions in information systems. In dynamic environments, systems are constantly undergoing changes, and accordingly, the associated configurations need to be updated in order to reflect the systems’ security evolutions. However, such updating process is generally complicated as the resulting system state is expected to meet necessary constraints. This paper presents an approach for assisting administrators to make a desirable update, in light of changes in RBAC systems. We propose a formalization of the update approach, investigate its properties, and develop an updating algorithm based on model checking techniques. Our experimental results demonstrate the effectiveness of the proposed approach.


Eurasip Journal on Wireless Communications and Networking | 2011

Inconsistency resolving of safety and utility in access control

Jianfeng Lu; Ruixuan Li; Jinwei Hu; Dewu Xu

Policy inconsistencies may arise between safety and utility policies due to their opposite objectives. In this work we provide a formal examination of policy inconsistencies resolution for the coexistence of static separation-of-duty (SSoD) policies and strict availability (SA) policies. Firstly, we reduce the complexity of reasoning about policy inconsistencies by static pruning technique and minimal inconsistency cover set. Secondly, we present a systematic methodology for measuring safety loss and utility loss, and evaluate the safety-utility tradeoff for each choice. Thirdly, we present two prioritized-based resolutions to deal with policy inconsistencies based on safety-utility tradeoff. Finally, experiments show the effectiveness and efficiency of our approach.


computer and communications security | 2010

A logic for authorization provenance

Jinwei Hu; Yan Zhang; Ruixuan Li; Zhengding Lu

In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existing authorization logics put few emphasis on this set of principals - authorization provenance. Reasoning about provenance enables to (1) defend against a class of attacks, (2) understand and analyze authorizations and the status of policy bases, and (3) obtain potentially efficient logging and auditing guided by provenance information. This paper presents the design and applications of a provenance-enabled authorization logic, called DBT. More specifically, we give a sound and complete axiomatic system of DBT. We also examine a class of provenance-aware policy bases and queries. One can syntactically extract provenance information from the structure of these queries if they are evaluated positively in provenance-aware policy bases. Finally, two case studies are presented to demonstrate possible applications of DBT.


international conference on tools with artificial intelligence | 2009

Managing Authorization Provenance: A Modal Logic Based Approach

Jinwei Hu; Yan Zhang; Ruixuan Li; Zhengding Lu

In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.


computational science and engineering | 2009

RBAC-Based Secure Interoperation Using Constraint Logic Programming

Jinwei Hu; Ruixuan Li; Zhengding Lu

Secure interoperation is an increasingly important issue forlarge-scale enterprise applications. In this paper, we investigate, through constraint logic programming (CLP), secure interoperation in collaborating environments which employ Role-Based Access Control (RBAC) policies. In particular, we propose two types of interoperation, permission-based and the role-based secure interoperation, both formulated in CLP. Since a wide range of conflicts that may arise during interoperation, we also present corresponding rules for conflict resolution. By allowing permission-based and role-based interoperation, our framework enables flexible secure interoperation configuration. The proposed permission-based and the role-based secure interoperation are a pair of complementary approaches. With specification of secure interoperation in CLP, formal analysis and reasoning can be performed on RBAC-based secure interoperation.


international conference industrial engineering other applications applied intelligent systems | 2012

Tracking and constraining authorization provenance

Jinwei Hu; Khaled M. Khan; Yun Bai; Yan Zhang

Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this definition captures the intuitions of authorization provenance. We also present an application of our notion of authorization provenance: specifying and enforcing a new type of security requirements.


computer and communications security | 2012

Constraint-enhanced role engineering via answer set programming

Jinwei Hu; Khaled M. Khan; Yun Bai; Yan Zhang

Collaboration


Dive into the Jinwei Hu's collaboration.

Top Co-Authors

Avatar

Ruixuan Li

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Zhengding Lu

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yan Zhang

University of Western Sydney

View shared research outputs
Top Co-Authors

Avatar

Jianfeng Lu

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yun Bai

University of Western Sydney

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaopu Ma

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Bin Liu

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Dewu Xu

Zhejiang Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge