Purpose-based access control policies and conflicting analysis

Wang, Hua and Sun, Lili and Varadharajan, Vijay (2010) Purpose-based access control policies and conflicting analysis. In: SEC 2010: Security and Privacy: Silver Linings in the Cloud, 20-23 Sep 2010, Brisbane, Australia.

[img] Text (Conference Program)
Wang_Sun_Varadharajan_SEC2010-Program.pdf

Download (47Kb)
[img]
Preview
Text (Published Version)
Wang_Sun_Varadharajan_SEC2010_PV.pdf

Download (693Kb)

Abstract

This paper proposes a purpose-based framework for supporting privacy preserving access control policies and mechanisms. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly complex privacy-related policies, taking into account features like purposes and conditions. A policy refers to an access right that a subject can have on an object, based on attribute predicates, obligation actions, and system conditions. Policy conflicting problems may arise when new access policies are generated. The structure of purpose involved access control policy is studied, and efficient conflict-checking algorithms are developed. Finally a discussion of our work in comparison with other access control and frameworks such as EPAL is presented.


Statistics for USQ ePrint 8466
Statistics for this ePrint Item
Item Type: Conference or Workshop Item (Commonwealth Reporting Category E) (Paper)
Refereed: Yes
Item Status: Live Archive
Additional Information: This conference was part of the World Computer Congress. (Security and Privacy: Silver Linings in the Cloud (SEC 2010)Permanent restricted access to paper due to publisher copyright restrictions.
Depositing User: Dr Hua Wang
Faculty / Department / School: Historic - Faculty of Sciences - Department of Maths and Computing
Date Deposited: 28 Nov 2010 09:28
Last Modified: 17 Aug 2014 20:16
Uncontrolled Keywords: purpose; privacy; access control; conflicts; authentication; cloud computing; intrusion detection; network security
Fields of Research (FOR2008): 08 Information and Computing Sciences > 0803 Computer Software > 080303 Computer System Security
08 Information and Computing Sciences > 0806 Information Systems > 080608 Information Systems Development Methodologies
15 Commerce, Management, Tourism and Services > 1503 Business and Management > 150307 Innovation and Technology Management
Socio-Economic Objective (SEO2008): B Economic Development > 89 Information and Communication Services > 8902 Computer Software and Services > 890299 Computer Software and Services not elsewhere classified
Identification Number or DOI: doi: 10.1007/978-3-642-15257-3_20
URI: http://eprints.usq.edu.au/id/eprint/8466

Actions (login required)

View Item Archive Repository Staff Only