Role-based access control in ORACLE7 and Trusted ORACLE7
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
The grid
Supporting Access Control in an Object-Oriented Database Language
EDBT '92 Proceedings of the 3rd International Conference on Extending Database Technology: Advances in Database Technology
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Role-based access control for collaborative enterprise in peer-to-peer computing environments
Proceedings of the eighth ACM symposium on Access control models and technologies
Integration of Heterogeneous Resources through Updatable Views
WETICE '04 Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
A Trust based Access Control Framework for P2P File-Sharing Systems
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 09
P-Hera: Scalable fine-grained access control for P2P infrastructures
ICPADS '05 Proceedings of the 11th International Conference on Parallel and Distributed Systems - Volume 01
Role-Based Access Control for Grid Database Services Using the Community Authorization Service
IEEE Transactions on Dependable and Secure Computing
Hi-index | 0.00 |
The management of access control (AC) policies in open distributed systems (ODS), like the Grid, P2P systems, or Virtual Repositories (databases or data grids) can take two extreme approaches. The first extreme approach is a centralized management of the policy (that still allows a distribution of AC policy enforcement). This approach requires a full trust in a central entity that manages the AC policy. The second extreme approach is fully distributed: every ODS participant manages his own AC policy. This approach can limit the functionality of an ODS, making it difficult to provide synergetic functions that could be designed in a way that would not violate AC policies of autonomous participants. This paper presents a method of AC policy management that allows a partially trusted central entity to maintain global AC policies, and individual participants to maintain own AC policies. The proposed method resolves conflicts of the global and individual AC policies. The proposed management method has been implemented in an access control system for a Virtual Policy that is used in two European 6th FP projects: eGov-Bus and VIDE. The impact of this access control system on performance has been evaluated and it has been found that the proposed AC method can be used in practice.