\relax \@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}} \citation{rbacstd04} \citation{chad03} \citation{mary03} \citation{javier03} \citation{chad03} \citation{mary03} \citation{javier03} \citation{chad02} \citation{chad03} \citation{ferra92} \citation{sterne92} \citation{sandhu96} \citation{vonsolms94} \citation{ferra95} \citation{rbacstd04} \citation{rbacstd04} \@writefile{toc}{\contentsline {section}{\numberline {2}Related Research Technologies}{3}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Role Based Access Control}{3}} \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces RBAC model\cite {rbacstd04}}}{3}} \newlabel{Figure 1: RBAC}{{1}{3}} \citation{rfc3281} \citation{sandhu96} \@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Privilege Management Infrastructure (PMI)}{4}} \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces PKC and Attribute certificates}}{4}} \newlabel{Figure 2: pkc vs ac}{{2}{4}} \@writefile{toc}{\contentsline {section}{\numberline {3}Design and Implementation of an SIS System}{5}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Design Considerations}{5}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Establishing PKI for SIS}{6}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Establishing PMI for SIS}{6}} \citation{openldap} \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Organizational Information Sharing System Overview}{7}} \@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Sample RBAC File Format}}{7}} \newlabel{table:RBAC File Format}{{3.3.1}{7}} \citation{openssl} \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Interaction between various SIS componenets}}{8}} \newlabel{Figure 3: Interaction between various SIS componenets}{{3}{8}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Mapping Role Hierarchy to permissions}{8}} \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Mapping Role Hierarchy to Permissions}}{8}} \newlabel{Figure 4: Mapping Role Hierarchy to Permissions}{{4}{8}} \citation{apache} \citation{modssl} \@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Administration tool}{9}} \newlabel{UserRoleSpecification}{{1}{9}} \newlabel{DelegatedRoleSpecification}{{2}{9}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.6}Access Permissions specification Format}{9}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.7}Information Sharing among Multiple Agencies}{9}} \@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Access Permissions specification Format}}{10}} \newlabel{table:Access Permissions specification Format}{{3.6}{10}} \citation{permiscookbook} \citation{permiscookbook} \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Control Flow in Access Control Decision and Enforcement engine}}{11}} \newlabel{Figure 5: Control Flow in ACE}{{5}{11}} \@writefile{toc}{\contentsline {section}{\numberline {4}Experimental results}{11}} \@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Prototype implementation}{11}} \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Message Flow between the components}}{12}} \newlabel{Figure 6: Message Flow in ACEF}{{6}{12}} \@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces attributeCertificateAttribute definition \cite {permiscookbook}}}{12}} \newlabel{table:attributeCertificateAttribute definition}{{4.1}{12}} \@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Experimental setup}{12}} \@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces LDAP DIT Format at each agency}}{13}} \newlabel{Figure 7: LDAP DIT format}{{7}{13}} \@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Performance Results}{13}} \@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces Performance Results in a multiple agency scenario}}{13}} \newlabel{table: multiple agency performance results}{{4.3}{13}} \@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces multi-agency prototype testbed of SIS}}{14}} \newlabel{Figure 8: multi-agency TestBed Setup}{{8}{14}} \@writefile{toc}{\contentsline {section}{\numberline {5}Lessons Learnt and Future Directions}{14}} \bibstyle{acm} \bibdata{sisreport} \@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion}{15}}