2016
DOI: 10.5755/j01.itc.45.3.13187
|View full text |Cite
|
Sign up to set email alerts
|

Approaches to access control policy comparison and the inter-domain role mapping problem

Abstract: The requirement to develop an organization makes collaboration with other organizations necessary, so the organizations can share resources to perform common tasks. Different organizational domains use different access control models to protect their resources from unauthorized access. Organizational collaboration is an important goal for distributed computing paradigms, but policy inconsistencies between domains will cause problems in a collaboration model that add to the problems involved in constructing the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Authors in [12] address the heterogeneity problem of access control models across collaborating organizations. They proposed an equivalent based access collaboration model EABC to protect shared resources.…”
Section: Case 3: Approaches Tackling the Interoperability Between Hetmentioning
confidence: 99%
See 1 more Smart Citation
“…Authors in [12] address the heterogeneity problem of access control models across collaborating organizations. They proposed an equivalent based access collaboration model EABC to protect shared resources.…”
Section: Case 3: Approaches Tackling the Interoperability Between Hetmentioning
confidence: 99%
“…Other works have assumed that collaborating organizations are adopting the same access control model and proposed centralized solutions like [8,9] or distributed solutions like [10,11] to control access cross-organizations. Few works have tackled the heterogeneity of access control models problem [12][13][14], and none of them according to our knowledge has given a complete solution for automatic policy mapping between heterogeneous systems that covers both syntactic and semantic transformation.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, access control systems (ACS) are mostly used as a measure to restrict the access to sensitive data, specific areas, personal account information as well as to protect valuables. At the same time, the access control policies play an important role in distributed systems, such as the case of organizational collaboration, in order to prevent the organization's shared resources (machines and servers) from any unauthorized use or access [49]. The presence of ACS in our daily life brings forth many software security related challenges to protect both individual privacy and enterprise property through commerce and industry.…”
Section: Introductionmentioning
confidence: 99%