Portable and flexible document access control mechanisms

被引:0
|
作者
Atallah, M [1 ]
Bykova, M
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
来源
COMPUTER SECURITY ESORICS 2004, PROCEEDINGS | 2004年 / 3193卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). While there are significant privacy-preservation advantages to the use of smart cards anonymously created and bought in public places (stores, libraries, etc), a major difficulty is that, for huge data repositories and limited-capacity portable storage devices, it is not possible to represent any possible access configuration on the card. For a customer whose card is supposed to contain a subset S of documents, access to all of S must be allowed. In some situations a small enough number of "false positives" (which are accesses to non-S documents) is acceptable to the server, and the challenge then is to minimize the number of false positives implicit to any given card. We describe and analyze schemes for both unstructured and structured collections of documents. For these schemes, we give fast algorithms for efficiently using the limited space available on the card. In our model the customer does not know which documents correspond to false positives, the probability of a randomly chosen document being a false positive is small, and information about false positives bound to one card is useless for any other card even if both of them permit access to the same set of documents S.
引用
收藏
页码:193 / 208
页数:16
相关论文
共 50 条
  • [1] A flexible framework for architecting XML access control enforcement mechanisms
    Luo, B
    Lee, D
    Lee, WC
    Liu, P
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 133 - 147
  • [2] Access control for XML document
    Bai, Yun
    NEW FRONTIERS IN APPLIED ARTIFICIAL INTELLIGENCE, 2008, 5027 : 621 - 630
  • [3] Flexible Access Control and Confidentiality over Encrypted Data for Document-based Database
    Almarwani, Maryam
    Konev, Boris
    Lisitsa, Alexei
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2019, : 606 - 614
  • [4] Embedded role based access control unit for the web document access control
    Shim, WB
    Park, S
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCI I, 2002, : 247 - 252
  • [5] Towards access control for logical document structures
    Dridi, F
    Neumann, G
    NINTH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 1998, : 322 - 327
  • [6] Access Control Framework for XML Document Collections
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    Vidakovic, Milan
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (03) : 591 - 609
  • [7] The mandatory access control model for document flow
    Fan, Yan-Fang
    Han, Zhen
    Zhao, Yong
    Geng, Xiu-Hua
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 694 - 697
  • [8] Access Control Mechanisms for Fraglets
    Martinelli, Fabio
    Petrocchi, Marinella
    2007 2ND BIO-INSPIRED MODELS OF NETWORKS, INFORMATION AND COMPUTING SYSTEMS (BIONETICS), 2007, : 96 - 99
  • [9] MECHANISMS THAT CONTROL REFERENTIAL ACCESS
    GERNSBACHER, MA
    BULLETIN OF THE PSYCHONOMIC SOCIETY, 1987, 25 (05) : 335 - 335
  • [10] Access Control Mechanisms for Femtocells
    de la Roche, Guillaume
    Valcarce, Alvaro
    Lopez-Perez, David
    Zhang, Jie
    IEEE COMMUNICATIONS MAGAZINE, 2010, 48 (01) : 33 - 39