2004
DOI: 10.1007/978-3-540-30108-0_12
|View full text |Cite
|
Sign up to set email alerts
|

Portable and Flexible Document Access Control Mechanisms

Abstract: Abstract. We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). While there are significant privacy-preservation advantages to the use of smart cards anonymously created and bought in public places (stores, libraries, etc), a major difficulty is that, for huge data repositories and limited-capacity portable storage devices, it is not possible to represent any possible access configurati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2004
2004
2007
2007

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…In [12], the authors consider static policy assignment to all repository documents, which makes addition of new items problematic without performing periodic policy updates (after which all smartcards must be refreshed) and also makes it possible for dishonest users to share and use information about false positives. In [1], similarly to this work, a unique policy representation is used for each subscription (even for identical subscriptions), but the solution given in that work does not have a deterministic algorithm and therefore might not be suitable in some settings. This paper is the first that describes solutions with a solid analysis that, given a threshold for the rate of false positives, are guaranteed to result in access rights specifications that do not exceed that threshold.…”
Section: Related Workmentioning
confidence: 95%
See 2 more Smart Citations
“…In [12], the authors consider static policy assignment to all repository documents, which makes addition of new items problematic without performing periodic policy updates (after which all smartcards must be refreshed) and also makes it possible for dishonest users to share and use information about false positives. In [1], similarly to this work, a unique policy representation is used for each subscription (even for identical subscriptions), but the solution given in that work does not have a deterministic algorithm and therefore might not be suitable in some settings. This paper is the first that describes solutions with a solid analysis that, given a threshold for the rate of false positives, are guaranteed to result in access rights specifications that do not exceed that threshold.…”
Section: Related Workmentioning
confidence: 95%
“…These solutions, however, do not apply to our problem, mainly because we cannot afford to avail ourselves of resources external to the card (as was the case in [4,2]). The more recent work in [1,12], on the other hand, considers the same problem of portable and flexible access rights for large data repositories. In [12], the authors consider static policy assignment to all repository documents, which makes addition of new items problematic without performing periodic policy updates (after which all smartcards must be refreshed) and also makes it possible for dishonest users to share and use information about false positives.…”
Section: Related Workmentioning
confidence: 98%
See 1 more Smart Citation
“…, i k then you get free access to document j". Schemes that do not have this vulnerability are considerably more computationally expensive [1], so the present scheme has a crucial virtue of being simple and inexpensive. The ideal deployment for the scheme of this paper is in dynamic situations where the document repository changes rapidly, the policies need to be re-generated on a periodic basis, or other situations where the card contents are refreshed periodically through interaction (say, once a month or more frequently) with a server.…”
Section: Implementation and Deployment Issuesmentioning
confidence: 99%
“…This is in fact another reason (in addition to the above-mentioned necessity of making the system less vulnerable to information-sharing attacks) why optimization needs to be periodically re-done, i.e., our scheme used with the new data to compute the new optimal solution. We leave the design of a self-evolving system that does not need such periodic check-points for future research (in fact we already have partial solutions to this [1]). …”
Section: Implementation and Deployment Issuesmentioning
confidence: 99%