ACTkit: A Framework for the Definition and Enforcement of Role, Content and Context-based Access Control Policies

被引:0
|
作者
Betarte, G. [1 ,3 ,4 ,5 ]
Gatto, A. [2 ,3 ]
Martinez, R. [2 ,3 ,5 ]
Zipitria, F. [1 ,3 ,4 ,5 ]
机构
[1] Univ Republica, Inst Computac, Fac Ingn, Montevideo, Uruguay
[2] Tilsor SA, Montevideo, Uruguay
[3] Univ Republ FING UDELAR, Fac Ingn, Montevideo, Uruguay
[4] Inst Computac InCo, Montevideo, Uruguay
[5] Grp Seguridad Informat GSI FING UDELAR, Montevideo, Uruguay
关键词
Authorization; RBAC; Application Security; Context-based and Content-based Access Control;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work describes a framework, called ACTkit, for the definition and enforcement of dynamic access control policies on (multi-tiered) information systems. ACTkit embodies a language for defining security policies built out of role-, context- and content-based access control rules and an access control module responsible for the policy enforcement. A model, which has been defined as an extension of Hierarchical RBAC to provide a precise semantics for the security policies, is also presented and discussed.
引用
收藏
页码:1742 / 1751
页数:10
相关论文
共 50 条
  • [21] Context-Based, Predictive Access Control to Electronic Health Records
    Psarra, Evgenia
    Apostolou, Dimitris
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Mentzas, Gregoris
    ELECTRONICS, 2022, 11 (19)
  • [22] Context-Based Access Control to Medical Data in Smart Homes
    Guennoun, Mouhcine
    Talon, Jonas
    Weddum, Catherine
    El-Khatib, Khalil
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATIONS, 2009, : 298 - 302
  • [23] Research on Role and Context-Based Usage Control Model
    Wu, HaiYing
    ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 665 - 670
  • [24] A context-based and associated access control model in pervasive computing environment
    Li, Ying
    Tong, Weiqin
    Zhi, Xiaoli
    2007 2ND INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2007, : 143 - 146
  • [25] Using Context Quality Indicators for Improving Context-based Access Control in Pervasive Environments
    Bringel Filho, Jose
    Martin, Herve
    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 285 - 290
  • [26] Towards awareness of privacy and quality of context in context-based access control for ubiquitous applications
    Filho, José Bringel
    Martin, Hervé
    Journal of Digital Information Management, 2009, 7 (04): : 219 - 226
  • [27] Context-Based E-Health System Access Control Mechanism
    Al-Neyadi, Fahed
    Abawajy, Jemal H.
    ADVANCES IN INFORMATION SECURITY AND ITS APPLICATION, 2009, 36 : 68 - 77
  • [28] Social Puzzles: Context-Based Access Control in Online Social Networks
    Jadliwala, Murtuza
    Maiti, Anindya
    Namboodiri, Vinod
    2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 299 - 310
  • [29] CoDRA: Context-based dynamically reconfigurable access control system for android
    Thanigaivelan, Nanda Kumar
    Nigussie, Ethiopia
    Hakkala, Antti
    Virtanen, Seppo
    Isoaho, Jouni
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 101 : 1 - 17
  • [30] Efficient IRM enforcement of history-based access control policies
    Yan, Fei
    Fong, Philip W. L.
    Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09, 2009, : 35 - 46