Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies - SACMAT '06 2006
DOI: 10.1145/1133058.1133088
|View full text |Cite
|
Sign up to set email alerts
|

Redirection policies for mission-based information sharing

Abstract: When an access decision function denies a data access request by a mission participant in a mission-critical situation, the mission often suffers. In this paper, we propose a sharing control mechanism that computes and executes requests that are mission-related to denied requests. We extend the Flexible Authorization Framework (FAF) with predicates and hierarchies that permit us to specify authorization rules over denied requests and mission-specific relationships. We illustrate our techniques using a prototyp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2008
2008
2010
2010

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Also our solution never changes users classifications or privileges for managing emergencies or critical events, but it defines policies to be considered in requests that do not satisfy traditional access control policies. Keppler et al [17] discuss the problem of managing requests that are denied, by providing a range of other possible actions to use in emergencies situations. The framework extends the Flexible Authorization Framework (FAF) [16] with a sharing policy language for request and data redirection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Also our solution never changes users classifications or privileges for managing emergencies or critical events, but it defines policies to be considered in requests that do not satisfy traditional access control policies. Keppler et al [17] discuss the problem of managing requests that are denied, by providing a range of other possible actions to use in emergencies situations. The framework extends the Flexible Authorization Framework (FAF) [16] with a sharing policy language for request and data redirection.…”
Section: Related Workmentioning
confidence: 99%
“…Policies in E U should be simple and must always grant access according to the break the glass principle since the promptness in reacting against exceptions is fundamental for preserving patients health. As a consequence, we adopt a solution different from the work in [17] where the concept of access request redirection is introduced to allow denied accesses in case of emergencies. In particular, space E U regulates access by providing post-incident capabilities (i.e., auditing) to be used subsequently to better redistribute policies and requests among the spaces.…”
mentioning
confidence: 99%
“…Much of the existing research on information sharing during crises has extensively addressed the need for secure access, focusing on comprehensive policy designs and analysis and efficient management of users' privileges and privacy. Recent studies found that in mission-critical systems, e.g., military, firefighting or supervisory control and data acquisition (i.e., computerized monitoring and controlling system), conventional access control mechanisms may be too rigid for urgent information-sharing scenarios and often fail to provide adequate support for access in non-routine, critical situations (Cheng, Rohatgi, Keser, Karger, Wagner, & Reninger, 2007;MITRE Corp., 2004;Swarup, Seligman, and Rosenthal, 2006;Keppler, Swarup, and Jajodia, 2006;Singh, Sanders, Nicol, and Seri, 2006). In critical infrastructures such as utility networks, oil and gas pipelines, and disaster and anti-terrorist communications, there is an increasing need to secure the information collected from and about the infrastructure, and yet to be able to allow flexible data sharing to facilitate problem-solving.…”
Section: Introductionmentioning
confidence: 99%
“…These problems are unique and challenging in emergency and crisis situations because of the dynamic nature of shared data and users. Several notable papers have proposed interesting solutions to the problem of flexible and controlled information sharing (Cheng et al 2007;MITRE Corp., 2004;Swarup et al, 2006;Keppler et al, 2006;Tamassia, Yao, and Winsborough, 2004;Yao, Frikken, Atallah, and Tamassia, 2006;Yao, Tamassia, and Proctor, 2005). The MITRE Corp. (2004) report presented a tokenized access framework and an economic model for regulating the tokens.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation