Configuring role-based access control to enforce mandatory and discretionary access control policies
ACM Transactions on Information and System Security (TISSEC)
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Information sharing and security in dynamic coalitions
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Models for coalition-based access control (CBAC)
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Dynamically authorized role-based access control for secure distributed computation
Proceedings of the 2002 ACM workshop on XML security
Cooperative role-based administration
Proceedings of the eighth ACM symposium on Access control models and technologies
dRBAC: Distributed Role-based Access Control for Dynamic Coalition Environments
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Agency interoperation for effective data mining in border control and homeland security applications
dg.o '05 Proceedings of the 2005 national conference on Digital government research
Using semantics for automatic enforcement of access control policies among dynamic coalitions
Proceedings of the 12th ACM symposium on Access control models and technologies
A conceptual framework for Group-Centric secure information sharing
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
ICISS'05 Proceedings of the First international conference on Information Systems Security
Using community structure to control information sharing in online social networks
Computer Communications
Hi-index | 0.00 |
The need to securely share information on an ad-hoc basis between collaborating entities is increasingly becoming important We propose a coalition based access control model (CBAC), comprised of three layers: coalition, role and user-object layers Our model enables translation of coalition level policies to implementation level access control in a manner similar to that of the layers of the TCP/IP protocol We present a coalition policy translation protocol that allows the implementation level access control details to be piggybacked as the access control policy percolates to the coalition level, and similarly, as the coalition level policy trickles down to the implementation level Under our approach, a user's request to access an object belonging to another coalition entity is automatically translated by employing an approach that considers attributes associated with user credentials and objects Our approach ensures that the individual access control policies of each coalition entity as well as the agreed-upon coalition policies for sharing are enforced.