A task-based security model to facilitate collaboration in trusted multi-agency networks
Proceedings of the 2002 ACM symposium on Applied computing
Static verification of security requirements in role based CSCW systems
Proceedings of the eighth ACM symposium on Access control models and technologies
Organization based access control
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Role-Based Access Control
Virtual enterprise access control requirements
SAICSIT '03 Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Purpose based access control of complex data for privacy protection
Proceedings of the tenth ACM symposium on Access control models and technologies
Security and Access Control for a Human-centric Collaborative Commerce System
CTS '06 Proceedings of the International Symposium on Collaborative Technologies and Systems
MUE '07 Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering
A Purpose-Based Access Control Model
IAS '07 Proceedings of the Third International Symposium on Information Assurance and Security
Trust-Based Access Control for Collaborative System
CCCM '08 Proceedings of the 2008 ISECS International Colloquium on Computing, Communication, Control, and Management - Volume 01
Team-based MAC policy over security-Enhanced Linux
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
A privacy-enhanced attribute-based access control system
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
A contextual attribute-based access control model
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II
Secure knowledge management: confidentiality, trust, and privacy
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
Future Generation Computer Systems
Hi-index | 0.00 |
Many efforts in the area of computer security have been drawn to attribute-based access control (ABAC). Compared to other up-to-date models, ABAC provides more granularity, scalability, and flexibility, which make it a valuable candidate for securing collaboration between organizations, especially over an open network such as the Internet. On the other hand, this model lacks provisions for trust and privacy issues, both of which are becoming increasingly critical, particularly in collaboration environments. Recently, we proposed a preliminary model to address this gap [1]. This paper is a further discussion and development of how trust and privacy can be incorporated in the previously introduced ABAC model. In addition, we propose a structure for access control model that can cover most of real world access scenarios and schemes. The paper concludes with some remarks on implementation of such models along with possible future directions on evolution of access control models in general.