tion to roles, object management defines all applica-
tion system components integrated in the ICP, includ-
ing Human Resources Management System, Power
Generating Management System, Finance Manage-
ment System, Worksheet Management System, Real-
time Information Display System. Here, the object is
in the table T
Object.
(4) Functions management
Here, we define the function that stands for speci-
fied business functions in the hydropower plant, such
as worksheet application, worksheet signature, work-
sheet permission, worksheet cancel, project audit,
read, write, and so on. The function is in the table
T
Func.
(5) Roles management
Roles delimit the functions of users within organi-
zations by prescribing the access to objects that users
have. Different roles are defined regarding to the re-
lationships between job descriptions within the prac-
tical hydropower plant. In addition, role constraints
and role inheritance are taken into account as well.
These are saved in a triple table T
Role.
(6) Function and object authorization
By means of function and object authorization,
The management policies in the hydropower plant are
converted into users-roles-authorizations. All future
access to any subsystems will retrieve authorization
assertions from the database server that creates the
user session. User identification and privileges deter-
mine the functionality of any application accessible
through the ICP. They are respectively saved in two
triple tables T
Ctrl and T Auth.
(7) Log management
Log management can track and analyse software
behaviour. Record user login time operation, audit
trail. User information, such as login time, logout
time, IP address, application system names and ob-
jects the user accesses during logon period, etc., are
recorded in the table T
Log.
5 EVALUATION
Before the integrated system was implemented, both
the Human Resources Management System and the
Worksheet Management System were independently
executed. A user had to respectively input his/her
username and password twice every time while he/she
needed to log on both the systems. The system ad-
ministrator must maintain two sets of authorization
and user management. However, after both the sys-
tem was integrated in the ICP, everything is becoming
simple. System administrator only needs to maintain
a set of authorization and user management. They can
log on all the systems after users only needs to input
his/her username and password once.
In addition, compared with some Role-based ac-
cess control approaches used in various application
systems (Thomsen et al., 1998)(Apfrlbeck, 2001), the
central security infrastructure presented in this paper
has some characteristics in the following:
(1) Granularity and extensibility
The ISM is able to provide finer-grain resource
access control than existing solutions since all pri-
mary resources (applications, functions, operations
and data) can be separately accessed; and it allows se-
curity policies to be flexibly and extensively defined.
(2) Accountability and auditability
The log management of the ISM provides opera-
tion log in order to track record. A lot of relevant
information can be recorded about actions performed
by users, or processes acting on their behalf, so that
the consequences of those actions can later be linked
to the users in question and, if necessary, users can
be held accountable and auditable for their actions. It
can satisfy requirements for both accountability and
auditability well.
(3) Feasibility and integrity
From Integrated Control Panel, a set of APIs can
deliver enormous value to IT organizations and end
users, enabling centralized access to applications in
order to gain a simplified infrastructure, faster devel-
opment, and enhanced programmers and users effi-
ciency.
The ICP framework can seamlessly integrate ex-
isting application systems and provide users with dy-
namic authorization into the applications.
(4) Authentication security strengthening
The ICP greatly improves the authentication secu-
rity of application systems by its Single Sign-On ac-
cess. A user can access all authorized applications, on
the basis of a single authentication that is performed
when he/she initially accesses any application inte-
grated into the ICP. Since the user has to remember
only one username/password, and needs to type this
information once, user productivity is improved and
security breaches such as users writing down their
passwords are eliminated.
On the other hand, the ISM is an independent au-
thentication system without user interaction. It does
not only centrally manage and control access to all ap-
plication systems integrated into the ICP but also pro-
vides a highly customizable set of role-based access
control policies and role mappings, which also greatly
improve the security of all application systems.
6 CONCLUSIONS AND FUTURE
WORK
This paper describes a central security infrastructure
to enable SSO for different application subsystems
IMPROVING SOFTWARE SECURITY THROUGH AN INTEGRATED APPROACH
441