Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (9): 699-717    DOI: 10.1631/jzus.C0910564
    
An authorization model for collaborative access control
Chen-hua Ma*,1, Guo-dong Lu1, Jiong Qiu2
1 Engineering and Computer Graphics Institute, Zhejiang University, Hangzhou 310027, China 2 Department of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
An authorization model for collaborative access control
Chen-hua Ma*,1, Guo-dong Lu1, Jiong Qiu2
1 Engineering and Computer Graphics Institute, Zhejiang University, Hangzhou 310027, China 2 Department of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
 全文: PDF 
摘要: Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks. Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights. Existing approaches to access control cannot satisfy the requirements of collaborative access control. To address this concern, we propose an authorization model for collaborative access control. The central notions of the model are collaborative permission, collaboration constraint, and collaborative authorization policy, which make it possible to define the collaboration among multiple subjects involved in gaining a permission. The implementation architecture of the model is also provided. Furthermore, we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.
关键词: Collaborative access controlCollaborative permissionConflict detection and resolution    
Abstract: Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks. Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights. Existing approaches to access control cannot satisfy the requirements of collaborative access control. To address this concern, we propose an authorization model for collaborative access control. The central notions of the model are collaborative permission, collaboration constraint, and collaborative authorization policy, which make it possible to define the collaboration among multiple subjects involved in gaining a permission. The implementation architecture of the model is also provided. Furthermore, we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.
Key words: Collaborative access control    Collaborative permission    Conflict detection and resolution
收稿日期: 2009-09-14 出版日期: 2010-09-07
CLC:  TP309.2  
基金资助: Project  (Nos.  2008C13073  and  2009C03015-1)  supported  by  the Large Science and Technology Special Social Development Program
of Zhejiang Province, China
通讯作者: Chen-hua MA     E-mail: mchma@zju.edu.cn
服务  
把本文推荐给朋友
加入引用管理器
E-mail Alert
RSS
作者相关文章  
Chen-hua Ma
Guo-dong Lu
Jiong Qiu

引用本文:

Chen-hua Ma, Guo-dong Lu, Jiong Qiu. An authorization model for collaborative access control. Front. Inform. Technol. Electron. Eng., 2010, 11(9): 699-717.

链接本文:

http://www.zjujournals.com/xueshu/fitee/CN/10.1631/jzus.C0910564        http://www.zjujournals.com/xueshu/fitee/CN/Y2010/V11/I9/699

[1] Shuang Tan, Yan Jia. NaEPASC:一种新颖且高效的云数据公开审计机制[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 794-804.
[2] Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren. [J]. Frontiers of Information Technology & Electronic Engineering, 2013, 14(2): 85-97.
[3] Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(8): 573-584.
[4] Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.