Attribute-Based Access Control in an Adaptive Hypermedia System

被引:0
|
作者
Ballesteros, Pedro [1 ]
Donoso, Yezid [1 ]
机构
[1] Univ Los Andes, Dept Syst & Comp Engn, Bogota, Colombia
关键词
Adaptive hypermedia; access control; XACML; AHA; ABAC;
D O I
10.1109/ICONS.2009.43
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays Internet and web applications handle a large amount of people's information. In most of the cases, this data is sensitive in security issues and has to be handled with care, but it is also very important to know what the users' profiles and presentation preferences are, in order to show them what they need and want. Many applications solve the problems of adapting the information to the user's profile or performing a secure data manipulation, but neither of these methods solves both problems at the same time. In this document we show the development of a project which provides an alternative to separated solutions, integrating two of the best applications attacking by their own the problems mentioned before. In addition, we show an example made to test if the integration was successfully.
引用
收藏
页码:114 / 119
页数:6
相关论文
共 50 条
  • [1] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [2] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [3] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [4] A privacy-enhanced attribute-based access control system
    Kolter, Jan
    Schillinger, Rolf
    Pernul, Guenther
    [J]. DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 129 - +
  • [5] Cooperative attribute-based access control for enterprise computing system
    Li, Mengting
    Huang, Xinyi
    Liu, Joseph K.
    Xu, Li
    Wu, Wei
    [J]. INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2015, 7 (3-4) : 191 - 202
  • [6] Mining Attribute-Based Access Control Policies
    Davari, Maryam
    Zulkernine, Mohammad
    [J]. INFORMATION SYSTEMS SECURITY, ICISS 2022, 2022, 13784 : 186 - 201
  • [7] Monotonicity and Completeness in Attribute-Based Access Control
    Crampton, Jason
    Morisset, Charles
    [J]. SECURITY AND TRUST MANAGEMENT (STM 2014), 2014, 8743 : 33 - 48
  • [8] ABACaaS: Attribute-Based Access Control as a Service
    Meshram, Augustee
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), 2019, : 153 - 155
  • [9] Mining Attribute-Based Access Control Policies
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 533 - 545
  • [10] A contextual attribute-based access control model
    Covington, Michael J.
    Sastry, Manoj R.
    [J]. On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, Pt 2, Proceedings, 2006, 4278 : 1996 - 2006