Group-centric models for secure and agile information sharing

  • Authors:
  • Ravi Sandhu;Ram Krishnan;Jianwei Niu;William H. Winsborough

  • Affiliations:
  • Institute for Cyber Security and Department of Computer Science, University of Texas at San Antonio;Institute for Cyber Security, University of Texas at San Antonio;Institute for Cyber Security and Department of Computer Science, University of Texas at San Antonio;Institute for Cyber Security and Department of Computer Science, University of Texas at San Antonio

  • Venue:
  • MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns of sharing are well defined and slow to change it is reasonable to apply the traditional access control models of lattice-based, role-based and attribute-based access control, along with discretionary authorization for further fine-grained control as required. Proprietary and standard rights markup languages have been developed to control what a legitimate recipient can do with the received information including control over its further discretionary dissemination. This dissemination-centric approach offers considerable flexibility in terms of controlling a particular information object with respect to already defined attributes of users, subjects and objects. However, it has many of the same or similar problems that discretionary access control manifests relative to role-based access control. In particular specifying information sharing patterns beyond those supported by currently defined authorization attributes is cumbersome or infeasible. Recently a novel mode of information sharing called group-centric was introduced by these authors. Group-centric secure information sharing (g-SIS) is designed to be agile and accommodate ad hoc patterns of information sharing. In this paper we review g-SIS models, discuss their relationship with traditional access control models and demonstrate their agility relative to these.