skip to main content
10.1145/1102486.1102503acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
Article

Access control management in a distributed environment supporting dynamic collaboration

Published:11 November 2005Publication History

ABSTRACT

Ensuring secure and authorized access to remote services and information resources in a dynamic collaborative environment is a challenging task. Two major issues that need to be addressed in this regard are: specification of access control requirements and trust management. Specification of access control requirements for dynamic collaboration is challenging mainly because of the limited or lack of knowledge about remote users' identities and affiliations. The access control policies and constraints defining users' authorization over remote resources and services need to be specified in terms of the attributes and properties of the users. Moreover, the criteria for validating the attributes of the users should also be specified as part of access control requirements. Trust management, in the context of dynamic collaboration, involves validation of user's attributes for secure interaction and prevention of unauthorized disclosure of policies and attributes. The paper discusses these issues in detail and presents a framework for access control and trust management in a distributed collaborative environment.

References

  1. Joshi, J. B. D., Bertino, E., Latif, U., and Ghafoor, A. Generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering, 17, 1 (Jan. 2005), 4--23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Ahmed, T. Policy Based Design of Secure Distributed Collaboration Systems. Ph. D. Thesis, University of Minnesota. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Grandison, T., and Sloman, M. A survey of trust in Internet applications. IEEE Communications Surveys, Fourth Quarter, 2000, 2--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Rahman, A.-A., and Hailes, S., A distributed trust model. In Proceedings of the Workshop on New Security Paradigms, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Rahman, A.-A. The PGP trust model. The Journal of Electronic Commerce, 1997.Google ScholarGoogle Scholar
  6. Ziegler, C. N., and Lausen, G. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Mass, Y., and Shehory, O. Distributed trust in open multi-agent systems. Trust in Cyber Societies, LNAI, R. Falcone, M. Singh, and Y.-H Tan Edition, 2001, 159--173. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Richardson, M., Agrawal, R., and Domingos, P. Trust management for the semantic web. In Proceedings of the International Semantic Web Conference, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Yu, T., and Winslett, M., A unified scheme for resource protection in automated trust negotiation, In Proceedings of the IEEE Symposium on Security and Privacy, May 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Yu, T., and Winslett, M., Policy migration for sensitive credentials in trust negotiation, In Proceedings of the ACM Workshop on Privacy in the Electronic Society, 2003, 9--20. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Winsborough, W., Li, N. Safety in automated trust negotiation, In Proceedings of the IEEE Symposium on Security and Privacy, 2004, 147--160.Google ScholarGoogle ScholarCross RefCross Ref
  12. Seamons, K.E., Winslett, M., and Yu, T. Limiting the disclosure of access control policies during automated trust negotiation. In Proceedings of the Workshop on Privacy Enhancing Technologies, 2002.Google ScholarGoogle Scholar
  13. Winsborough, W., and Li, N. Towards practical automated trust negotiation. In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, 2002, 92--103. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Li, N., Mitchell, J. C., and Winsborough, W. Design of a role-based trust-management framework. In Proceedings of the IEEE Symposium on Security and Privacy, 2002, 114--130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Wang, L., Wijesekera, D., and Jajodia, S. A logic-based framework for attribute based access control, In Proceedings of the ACM Workshop on Formal Methods in Security Engineering, 2004, 45--55. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Bertino, E., Ferrari, E., and Atluri, V. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2, 1, (1999), 65--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Yu, J. Dynamic web service invocation based on UDDI. In Proceedings of the IEEE International Conference on E-Commerce Technology for Dynamic E-Business, 2004, 154--157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Sandhu, R., Coyne, E. J., Feinstein, H. L., and Youman, C. E., Role based access control models. IEEE Computer, 29, 2, (Feb. 1996), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Bhatti, R., Ghafoor, A., Bertino, E., and Joshi, J. B. D. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security, 8, 2 (May 2005), 187--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. OASIS XML-Based Security Services Technical Committee (SSTC). Security Assertion Markup Language (SAML). Technical Report, http://xml.coverpages.org/saml.html.Google ScholarGoogle Scholar
  21. Bhatti, R., Bertino, E., and Ghafoor, A. An integrated approach to federated identity and privilege management in open systems. Accepted for publication in the Communications of the ACM. Also available as CERIAS Technical Report TR 2005-42, https://www.cerias.purdue.edu/tools_and_resources/bibtex_archive/archive/2005-42.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Access control management in a distributed environment supporting dynamic collaboration

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DIM '05: Proceedings of the 2005 workshop on Digital identity management
            November 2005
            120 pages
            ISBN:1595932321
            DOI:10.1145/1102486

            Copyright © 2005 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 November 2005

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate16of34submissions,47%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader