Abstract | ||
---|---|---|
Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to
protect confidential resources and sensitive tasks. Collaborative access control means that multiple subjects should participate
to make access control decisions to prevent fraud or the abuse of rights. Existing approaches to access control cannot satisfy
the requirements of collaborative access control. To address this concern, we propose an authorization model for collaborative
access control. The central notions of the model are collaborative permission, collaboration constraint, and collaborative
authorization policy, which make it possible to define the collaboration among multiple subjects involved in gaining a permission.
The implementation architecture of the model is also provided. Furthermore, we present effective conflict detection and resolution
methods for maintaining the consistency of collaborative authorization policies. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1631/jzus.C0910564 | Journal of Zhejiang University: Science C |
Keywords | Field | DocType |
conflict detection and resolution,collaborative access control,collaborative permission,satisfiability,access control | Abuse of rights,Computer access control,Permission,Internet privacy,Architecture,Confidentiality,Computer science,Computer security,Authorization,Access control | Journal |
Volume | Issue | ISSN |
11 | 9 | 1869-196X |
Citations | PageRank | References |
2 | 0.38 | 16 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Chen-hua Ma | 1 | 2 | 0.72 |
Guodong Lu | 2 | 68 | 14.74 |
guodong | 3 | 4 | 0.76 |
guodong | 4 | 4 | 0.76 |
jiong | 5 | 6 | 1.23 |
jiong | 6 | 6 | 1.23 |