Proceedings of the 13th ACM Symposium on Access Control Models and Technologies 2008
DOI: 10.1145/1377836.1377853
|View full text |Cite
|
Sign up to set email alerts
|

Policy decomposition for collaborative access control

Abstract: With the advances in web service techniques, new collaborative applications have emerged like supply chain arrangements and coalition in government agencies. In such applications, the collaborating parties are responsible for managing and protecting resources entrusted to them. Access control decisions thus become a collaborative activity in which a global policy must be enforced by a set of collaborating parties without compromising the autonomy or confidentiality requirements of these parties. Unfortunately,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0
1

Year Published

2008
2008
2016
2016

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(36 citation statements)
references
References 17 publications
(27 reference statements)
0
35
0
1
Order By: Relevance
“…Collaborative access control aims to balance the competing goals of collaboration and security [14]: collaborative systems aim to facilitate the sharing of information, while security aims to protect the same information. A number of collaborative access control models have been proposed in the literature [15]- [19]. For instance, Lin et al [19] propose an access control model for collaborative environments based on the notion of policy decomposition.…”
Section: Related Workmentioning
confidence: 99%
“…Collaborative access control aims to balance the competing goals of collaboration and security [14]: collaborative systems aim to facilitate the sharing of information, while security aims to protect the same information. A number of collaborative access control models have been proposed in the literature [15]- [19]. For instance, Lin et al [19] propose an access control model for collaborative environments based on the notion of policy decomposition.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, their approach does not maintain policy equivalence and does not directly apply to our goal. Finally, the work of Lin et al [22] sketches a theoretical framework for policy decomposition and distribution based on performance and confidentiality requirements. Their goal is similar to ours and their work has been an important influence.…”
Section: Related Workmentioning
confidence: 99%
“…Various approaches [8,12,14] have been proposed to address performance issues in systems interacting with access control policies. Jahid et al [8] focus on XACML policy verification for database access control.…”
Section: Related Workmentioning
confidence: 99%
“…Lin et al [12] decomposed a global XACML policy into local policies related to collaborating parties, and the local policies are sent to corresponding PDPs. The request evaluation is based on local policies by considering the relationships among local policies.…”
Section: Related Workmentioning
confidence: 99%