\relax \citation{rbacstd04} \citation{chad03} \citation{mary03} \citation{javier03} \@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}} \citation{chad03} \citation{mary03} \citation{javier03} \citation{chad02} \citation{chad03} \citation{ferra92} \citation{sterne92} \citation{sandhu96} \citation{vonsolms94} \citation{ferra95} \citation{rbacstd04} \citation{rbacstd04} \@writefile{toc}{\contentsline {section}{\numberline {2}Related Research Technologies}{2}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Role Based Access Control}{2}} \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces model\cite {rbacstd04}}}{2}} \newlabel{Figure 1: Core RBAC}{{1}{2}} \citation{rfc3281} \citation{mary03} \citation{sandhu96} \@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Privilege Management Infrastructure (PMI)}{3}} \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces PKC and Attribute certificates}}{3}} \newlabel{Figure 2: pkc vs ac}{{2}{3}} \@writefile{toc}{\contentsline {subsection}{\numberline {2.3}Related work}{3}} \@writefile{toc}{\contentsline {section}{\numberline {3}Design and Implementation of an SIS System}{4}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Design Considerations}{4}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Establishing PKI for SIS}{4}} \citation{openldap} \@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Establishing PMI for SIS}{5}} \@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Organizational Information Sharing System Overview}{5}} \@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Sample RBAC File Format}}{5}} \newlabel{table:RBAC File Format}{{3.3.1}{5}} \citation{openssl} \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Interaction between various SIS components}}{6}} \newlabel{Figure 3: Interaction between various SIS components}{{3}{6}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Mapping Role Hierarchy to permissions}{6}} \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Mapping Role Hierarchy to Permissions}}{6}} \newlabel{Figure 4: Mapping Role Hierarchy to Permissions}{{4}{6}} \citation{apache} \citation{modssl} \@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Administration tool}{7}} \newlabel{UserRoleSpecification}{{1}{7}} \newlabel{DelegatedRoleSpecification}{{2}{7}} \@writefile{toc}{\contentsline {subsection}{\numberline {3.6}Access Permissions specification Format}{7}} \@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Access Permissions specification Format}}{7}} \newlabel{table:Access Permissions specification Format}{{3.6}{7}} \citation{permiscookbook} \@writefile{toc}{\contentsline {subsection}{\numberline {3.7}Information Sharing among Multiple Agencies}{8}} \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Control Flow in Access Control Decision and Enforcement engine}}{8}} \newlabel{Figure 5: Control Flow in ACE}{{5}{8}} \@writefile{toc}{\contentsline {section}{\numberline {4}Experimental results}{8}} \citation{permiscookbook} \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces Message Flow between the components}}{9}} \newlabel{Figure 6: Message Flow in ACEF}{{6}{9}} \@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Prototype implementation}{9}} \@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces attributeCertificateAttribute definition \cite {permiscookbook}}}{9}} \newlabel{table:attributeCertificateAttribute definition}{{4.1}{9}} \@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Experimental setup}{9}} \@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces LDAP DIT Format at each agency}}{10}} \newlabel{Figure 7: LDAP DIT format}{{7}{10}} \@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces multi-agency prototype testbed of SIS}}{10}} \newlabel{Figure 8: multi-agency Testbed Setup}{{8}{10}} \@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Performance Results}{11}} \@writefile{lot}{\contentsline {table}{\numberline {4}{\ignorespaces Performance Results in a multiple agency scenario}}{11}} \newlabel{table: multiple agency performance results}{{4.3}{11}} \@writefile{toc}{\contentsline {section}{\numberline {5}Lessons Learnt and Future Directions}{11}} \@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion}{11}} \bibstyle{acm} \bibdata{sisreport} \bibcite{chad02}{1} \bibcite{chad03}{2} \bibcite{ferra95}{3} \bibcite{ferra92}{4} \bibcite{apache}{5} \bibcite{javier03}{6} \bibcite{modssl}{7} \bibcite{rbacstd04}{8} \bibcite{openldap}{9} \bibcite{openssl}{10} \bibcite{permiscookbook}{11} \bibcite{sandhu96}{12} \bibcite{rfc3281}{13} \bibcite{sterne92}{14} \bibcite{mary03}{15} \bibcite{vonsolms94}{16}