Relationship-based access control: More than a social network access control model

被引:4
|
作者
Lobo, Jorge [1 ,2 ]
机构
[1] ICREA, Barcelona, Spain
[2] Univ Pompeu Fabra, Dept Tecnol Informacio & Comunicac, C Roc Boronat 138, Barcelona 08018, Spain
关键词
access control models; social media services; TRUST;
D O I
10.1002/widm.1282
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In a computer system, access control refers to the mechanisms the system use to decide whether to grant or reject access to its resources. Access control decisions in social media services, such as Facebook, Twitter, Research Gate, or LinkedIn, are determined in large part by policies that can be described in terms of the relationships among the individuals potentially affected by the decision. The premise behind a larger interest in Relationship-based Access Control (ReBAC) is that besides social media services, social and other forms of relationships can be an effective abstraction for describing and implementing access control policies. The aim of this paper is to present an overview of ReBAC from the point of view of the types of policies that have motivated the access control research community to develop different ReBAC systems. We also review and reflect on what it would take to implement and administer an ReBAC system.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] An Administrative Model for Relationship-Based Access Control
    Stoller, Scott D.
    [J]. Data and Applications Security and Privacy XXIX, 2015, 9149 : 53 - 68
  • [2] Semantic Representation of RTBAC: Relationship-Based Access Control Model
    Chae, Song-hwa
    Kim, Wonil
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 554 - +
  • [3] Mining Relationship-Based Access Control Policies
    Thang Bui
    Stoller, Scott D.
    Li, Jiajie
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 239 - 246
  • [4] Policy templates for relationship-based access control
    Aktoudianakis, Evangelos
    Crampton, Jason
    Schneider, Steve
    Treharne, Helen
    Waller, Adrian
    [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 221 - 228
  • [5] A User-to-User Relationship-Based Access Control Model for Online Social Networks
    Cheng, Yuan
    Park, Jaehong
    Sandhu, Ravi
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 8 - 24
  • [6] Relationship-Based Access Control for Resharing in Decentralized Online Social Networks
    Gay, Richard
    Hu, Jinwei
    Mantel, Heiko
    Mazaheri, Sogol
    [J]. FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2017), 2018, 10723 : 18 - 34
  • [7] Relationship-based federated access control model for EPC Discovery Service
    Liu, Bing
    Chu, Chao-Hsien
    [J]. COMPUTERS & SECURITY, 2015, 55 : 251 - 270
  • [8] Active Learning of Relationship-Based Access Control Policies
    Iyer, Padmavathi
    Masoumzadeh, Amirreza
    [J]. SACMAT'20: PROCEEDINGS OF THE 25TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2020, : 155 - 166
  • [9] Security Analysis of Relationship-Based Access Control Policies
    Masoumzadeh, Amirreza
    [J]. PROCEEDINGS OF THE EIGHTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'18), 2018, : 186 - 195
  • [10] Performance analysis of Relationship-Based Access Control in OSNs
    Carminati, Barbara
    Ferrari, Elena
    Girardi, Jacopo
    [J]. 2012 IEEE 13TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IRI), 2012, : 449 - 456