Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2010, Vol. 11 Issue (9): 699-717    DOI: 10.1631/jzus.C0910564
    
An authorization model for collaborative access control
Chen-hua Ma*,1, Guo-dong Lu1, Jiong Qiu2
1 Engineering and Computer Graphics Institute, Zhejiang University, Hangzhou 310027, China 2 Department of Computer Science and Technology, Hangzhou Dianzi University, Hangzhou 310018, China
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      

Abstract  Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks. Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights. Existing approaches to access control cannot satisfy the requirements of collaborative access control. To address this concern, we propose an authorization model for collaborative access control. The central notions of the model are collaborative permission, collaboration constraint, and collaborative authorization policy, which make it possible to define the collaboration among multiple subjects involved in gaining a permission. The implementation architecture of the model is also provided. Furthermore, we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.

Key wordsCollaborative access control      Collaborative permission      Conflict detection and resolution     
Received: 14 September 2009      Published: 07 September 2010
CLC:  TP309.2  
Fund:  Project  (Nos.  2008C13073  and  2009C03015-1)  supported  by  the Large Science and Technology Special Social Development Program
of Zhejiang Province, China
Cite this article:

Chen-hua Ma, Guo-dong Lu, Jiong Qiu. An authorization model for collaborative access control. Front. Inform. Technol. Electron. Eng., 2010, 11(9): 699-717.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/jzus.C0910564     OR     http://www.zjujournals.com/xueshu/fitee/Y2010/V11/I9/699


An authorization model for collaborative access control

Collaborative access control is receiving growing attention in both military and commercial areas due to an urgent need to protect confidential resources and sensitive tasks. Collaborative access control means that multiple subjects should participate to make access control decisions to prevent fraud or the abuse of rights. Existing approaches to access control cannot satisfy the requirements of collaborative access control. To address this concern, we propose an authorization model for collaborative access control. The central notions of the model are collaborative permission, collaboration constraint, and collaborative authorization policy, which make it possible to define the collaboration among multiple subjects involved in gaining a permission. The implementation architecture of the model is also provided. Furthermore, we present effective conflict detection and resolution methods for maintaining the consistency of collaborative authorization policies.

关键词: Collaborative access control,  Collaborative permission,  Conflict detection and resolution 
[1] Shuang Tan, Yan Jia. NaEPASC: a novel and efficient public auditing scheme for cloud data[J]. Front. Inform. Technol. Electron. Eng., 2014, 15(9): 794-804.
[2] Yong Cheng, Zhi-ying Wang, Jun Ma, Jiang-jiang Wu, Song-zhu Mei, Jiang-chun Ren. Efficient revocation in ciphertext-policy attribute-based encryption based cryptographic cloud storage[J]. Front. Inform. Technol. Electron. Eng., 2013, 14(2): 85-97.
[3] Hong-yuan Chen, Yue-sheng Zhu. A robust watermarking algorithm based on QR factorization and DCT using quantization index modulation technique[J]. Front. Inform. Technol. Electron. Eng., 2012, 13(8): 573-584.
[4] Xian-ting ZENG, Xue-zeng PAN, Ling-di PING, Zhuo LI. Robust lossless data hiding scheme[J]. Front. Inform. Technol. Electron. Eng., 2010, 11(2): 101-110.