Secure information sharing using role-based delegation

被引:6
|
作者
Ahn, GJ [1 ]
Mohan, B [1 ]
机构
[1] Univ N Carolina, Charlotte, NC 28223 USA
关键词
information sharing; role-based; delegation;
D O I
10.1109/ITCC.2004.1286758
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.
引用
收藏
页码:810 / 815
页数:6
相关论文
共 50 条
  • [1] Towards secure information sharing using role-based delegation
    Ahn, Gall-Joon
    Mohan, Badrinath
    Hong, Seng-Phil
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2007, 30 (01) : 42 - 59
  • [2] A Secure e-Governance Model Using Role-Based Delegation
    Bannore, Aparna
    Devane, Satish
    [J]. THIRD INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, 2019, 797 : 911 - 919
  • [3] Delegation in a role-based organization
    Pacheco, O
    Santos, F
    [J]. DEONTIC LOGIC IN COMPUTER SCIENCE, PROCEEDINGS, 2004, 3065 : 209 - 227
  • [4] Secure Spectrum Sensing in Cognitive-Radio-Based Smart Grid Using Role-Based Delegation
    Al Hussien, Nedaa
    Barka, Ezedin
    Abdel-Hafez, Mohammed
    Shuaib, Khaled
    [J]. PROCEEDINGS OF THE 2016 8TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING (ICIME 2016), 2016, : 25 - 29
  • [5] Constrained role-based delegation
    Zhang, LH
    Ahn, GJ
    [J]. SECURITY AND PRIVACY IN THE AGE OF UNCERTAINTY, 2003, 122 : 289 - 300
  • [6] Role delegation in role-based access control
    Na, SangYeob
    Cheon, SuhHyun
    [J]. Proceedings of the ACM Workshop on Role-Based Access Control, 2000, : 39 - 44
  • [7] Delegation in role-based access control
    Jason Crampton
    Hemanth Khambhammettu
    [J]. International Journal of Information Security, 2008, 7 : 123 - 136
  • [8] Delegation in role-based access control
    Crampton, Jason
    Khambhammettu, Hemanth
    [J]. COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 174 - +
  • [9] Framework for role-based delegation models
    Barka, E
    Sandhu, R
    [J]. 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 168 - 176
  • [10] Role-based delegation with negative authorization
    Wang, H
    Cao, JL
    Ross, D
    [J]. FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 307 - 318