Portable and flexible document access control mechanisms

被引:0
|
作者
Atallah, M [1 ]
Bykova, M
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Purdue Univ, CERIAS, W Lafayette, IN 47907 USA
来源
COMPUTER SECURITY ESORICS 2004, PROCEEDINGS | 2004年 / 3193卷
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present and analyze portable access control mechanisms for large data repositories, in that the customized access policies are stored on a portable device (e.g., a smart card). While there are significant privacy-preservation advantages to the use of smart cards anonymously created and bought in public places (stores, libraries, etc), a major difficulty is that, for huge data repositories and limited-capacity portable storage devices, it is not possible to represent any possible access configuration on the card. For a customer whose card is supposed to contain a subset S of documents, access to all of S must be allowed. In some situations a small enough number of "false positives" (which are accesses to non-S documents) is acceptable to the server, and the challenge then is to minimize the number of false positives implicit to any given card. We describe and analyze schemes for both unstructured and structured collections of documents. For these schemes, we give fast algorithms for efficiently using the limited space available on the card. In our model the customer does not know which documents correspond to false positives, the probability of a randomly chosen document being a false positive is small, and information about false positives bound to one card is useless for any other card even if both of them permit access to the same set of documents S.
引用
收藏
页码:193 / 208
页数:16
相关论文
共 50 条
  • [41] Secure Document Sharing And Access Control on Cloud for Corporate User
    Gajghate, Kanchan S.
    Mante, R. V.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 135 - 138
  • [42] Integrity Based Access Control Model for Multilevel XML Document
    洪帆
    冯学斌
    黄志
    郑明辉
    Journal of Southwest Jiaotong University(English Edition), 2008, (02) : 109 - 114
  • [43] Action-based multilevel access control for structured document
    Xiong, J. (jinbo810@163.com), 1600, Science Press (50):
  • [44] Specifying and enforcing access control policies for XML document sources
    Bertino E.
    Castano S.
    Ferrari E.
    Mesiti M.
    World Wide Web, 2000, 3 (03) : 139 - 151
  • [45] Vibration control of flexible linkage mechanisms - A review
    Song, Yimin
    Zhang, Ce
    Yu, Yueqing
    Ma, Wengui
    Jixie Gongcheng Xuebao/Chinese Journal of Mechanical Engineering, 2001, 37 (10): : 12 - 13
  • [46] Pole assignment for control of flexible link mechanisms
    Ouyang, H.
    Richiedei, D.
    Trevisani, A.
    JOURNAL OF SOUND AND VIBRATION, 2013, 332 (12) : 2884 - 2899
  • [47] THE ACCESS PORTABLE COMPUTER
    KEPNER, T
    BYTE, 1983, 8 (09): : 188 - &
  • [48] Paradigm regained: Abstraction mechanisms for access control
    Miller, MS
    Shapiro, JS
    ADVANCES IN COMPUTING SCIENCE - ASIAN 2003: PROGRAMMING LANGUAGES AND DISTRIBUTED COMPUTATION, 2003, 2896 : 224 - 242
  • [49] A survey on access control mechanisms for cloud computing
    El Sibai, Rayane
    Gemayel, Nader
    Abdo, Jacques Bou
    Demerjian, Jacques
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [50] Access control mechanisms in digital library services
    Patel, A
    COMPUTER STANDARDS & INTERFACES, 2001, 23 (01) : 19 - 28