Role-Based Access Control Models
Computer
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
WACC '99 Proceedings of the international joint conference on Work activities coordination and collaboration
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Providing Security and Interoperation of HeterogeneousSystems
Distributed and Parallel Databases - Security of data and transaction processing
Merging heterogenous security orderings
Journal of Computer Security
Authorization specification and enforcement in federated database systems
Journal of Computer Security
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
An Approach for Building Secure Database Federations
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Security Issues in Federated Database Systems: Panel Contributions
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Web Implementation of a Securtty Mediator for Medical Databases
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects
Virtual Enterprises and Federated Information Sharing
DEXA '98 Proceedings of the 9th International Conference on Database and Expert Systems Applications
Role-Based Access Control
The Complexity and Composability of Secure Interoperation
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
On mutually-exclusive roles and separation of duty
Proceedings of the 11th ACM conference on Computer and communications security
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
IT-enabled sense-and-respond strategies in complex public organizations
Communications of the ACM - Adaptive complex enterprises
Composing mappings among data sources
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
A usage-based authorization framework for collaborative computing systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Web services discovery in secure collaboration environments
ACM Transactions on Internet Technology (TOIT)
Toward a Usage-Based Security Framework for Collaborative Computing Systems
ACM Transactions on Information and System Security (TISSEC)
Workflow authorisation in mediator-free environments
International Journal of Security and Networks
Separation of Duty in Trust-Based Collaboration
Information Security and Cryptology
Handling inheritance violation for secure interoperation of heterogeneous systems
International Journal of Security and Networks
Establishing RBAC-based secure interoperability in decentralized multi-domain environments
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Mediator-free secure policy interoperation of exclusively-trusted multiple domains
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
A secure collaboration service for dynamic virtual organizations
Information Sciences: an International Journal
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
RAR: A role-and-risk based flexible framework for secure collaboration
Future Generation Computer Systems
Protecting critical infrastructures while preserving each organization's autonomy
ICDCIT'11 Proceedings of the 7th international conference on Distributed computing and internet technology
ASRBAC: a security administration model for mobile autonomic networks (MAutoNets)
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Flying over Mobile Clouds with Security Planes: Select Your Class of SLA for End-to-End Security
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
Hi-index | 0.00 |
The internet and related technologies have made multidomain collaborations a reality. Collaboration enables domains to effectively share resources; however it introduces several security and privacy challenges. Managing security in the absence of a central mediator is even more challenging. In this paper, we propose a distributed secure interoperability framework for mediator-free collaboration environments. We introduce the idea of secure access paths which enables domains to make localized access control decisions without having global view of the collaboration. We also present a path authentication technique for proving path authenticity. Furthermore, we present both a proactive and on-demand path discovery algorithms that enable domains to securely discover paths in the collaboration environment.