2006
DOI: 10.1002/cpe.1099
|View full text |Cite
|
Sign up to set email alerts
|

Achieving fine‐grained access control in virtual organizations

Abstract: SUMMARYIn a virtual organization environment, where services and data are provided and shared among organizations from different administrative domains and protected with dissimilar security policies and measures, there is a need for a flexible authentication framework that supports the use of various authentication methods and tokens. The authentication strengths derived from the authentication methods and tokens should be incorporated into an access-control decision-making process, so that more sensitive res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2008
2008
2012
2012

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…-Authentication policy -says what level of authentication/assurance is required of requesting subjects who are to be allowed to access the associated data. Whilst it is possible to represent this policy in the authorization policy through the use of Level of Assurance, as for example as described in [28], by keeping this as a separate policy it allows the PEP to short circuit the whole authorization process if the requesting subject has not been authenticated sufficiently. -Data manipulation policy -provides rules for how the associated data (usually PII) can be transformed, enriched or aggregated with other personal data of the same data subject or of other data subjects.…”
Section: Sticky Policy Contentsmentioning
confidence: 99%
“…-Authentication policy -says what level of authentication/assurance is required of requesting subjects who are to be allowed to access the associated data. Whilst it is possible to represent this policy in the authorization policy through the use of Level of Assurance, as for example as described in [28], by keeping this as a separate policy it allows the PEP to short circuit the whole authorization process if the requesting subject has not been authenticated sufficiently. -Data manipulation policy -provides rules for how the associated data (usually PII) can be transformed, enriched or aggregated with other personal data of the same data subject or of other data subjects.…”
Section: Sticky Policy Contentsmentioning
confidence: 99%
“…(Whilst it is possible to represent LoAs in the authorization policy e.g. as described in [17], by keeping this as a separate policy it allows the PEP to short circuit the whole authorization process if the requesting subject has not been authenticated sufficiently.) -data manipulation policy -provides rules for how the associated data (usually PII) can be transformed, enriched or aggregated with other personal data of the same data subject or of other data subjects.…”
Section: Sticky Policy Contentsmentioning
confidence: 99%
“…ABAC is a generalization of the well‐known role‐based access control (RBAC) model 3, in which a role is not restricted to an organizational role, but can be any attribute of the subject, such as a professional qualification or their current level of authentication (LoA) 4. In the following discussion we will refer to roles, on the assumption that we mean any attribute that can be assigned to a subject.…”
Section: Conceptual Modelsmentioning
confidence: 99%