Portable and flexible document access control mechanisms

被引:0
|
作者
Atallah, M [1 ]
Bykova, M
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
来源
COMPUTER SECURITY ESORICS 2004, PROCEEDINGS | 2004年 / 3193卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). While there are significant privacy-preservation advantages to the use of smart cards anonymously created and bought in public places (stores, libraries, etc), a major difficulty is that, for huge data repositories and limited-capacity portable storage devices, it is not possible to represent any possible access configuration on the card. For a customer whose card is supposed to contain a subset S of documents, access to all of S must be allowed. In some situations a small enough number of "false positives" (which are accesses to non-S documents) is acceptable to the server, and the challenge then is to minimize the number of false positives implicit to any given card. We describe and analyze schemes for both unstructured and structured collections of documents. For these schemes, we give fast algorithms for efficiently using the limited space available on the card. In our model the customer does not know which documents correspond to false positives, the probability of a randomly chosen document being a false positive is small, and information about false positives bound to one card is useless for any other card even if both of them permit access to the same set of documents S.
引用
收藏
页码:193 / 208
页数:16
相关论文
共 50 条
  • [21] Extensible access control model for XML document collections
    Sladic, Goran
    Milosavljevic, Branko
    Konjovic, Zora
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 373 - 380
  • [22] Towards integration of XML document access and version control
    Chatvichienchai, S
    Anutariya, C
    Iwaihara, M
    Wuwongse, V
    Kambayashi, Y
    DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, 3180 : 791 - 800
  • [23] Design of Document Access Control Mechanism on Cloud Services
    Tseng, Chun-Wei
    Liu, Feng-Jung
    Huang, Shih-Hao
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 99 - 102
  • [24] An Access Control Model for Supporting XML Document Updating
    Mirabi, Meghdad
    Ibrahim, Hamidah
    Fathi, Leila
    Udzir, Nur Izura
    Mamat, Ali
    NETWORKED DIGITAL TECHNOLOGIES, 2011, 136 : 37 - 46
  • [25] A Flexible Access Control Mechanism for Mobile Commerce
    Lo, Chi-Chun
    Huang, Chun-Chieh
    Chang, Chung-Huan
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 145 - 146
  • [26] FLEXIBLE ACCESS-CONTROL WITH MASTER KEYS
    CHICK, GC
    TAVARES, SE
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 316 - 322
  • [27] Flexible support for multiple access control policies
    Jajodia, S
    Samarati, P
    Sapino, ML
    Subrahmanian, VS
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2001, 26 (02): : 214 - 260
  • [28] A flexible access control model for Web services
    Bertino, E
    Squicciarini, AC
    FLEXIBLE QUERY ANSWERING SYSTEMS, PROCEEDINGS, 2004, 3055 : 13 - 16
  • [29] Flexible access control using IPC redirection
    Jaeger, Trent
    Elphinstone, Kevin
    Liedtke, Jochen
    Panteleenko, Vsevolod
    Park, Yoonho
    Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS, 1999, : 191 - 196
  • [30] Flexible access control framework for MARC records
    Sladic, Goran
    Milosavljevic, Branko
    Surla, Dusan
    Konjovic, Zora
    ELECTRONIC LIBRARY, 2012, 30 (05): : 623 - 652