2003
DOI: 10.1007/978-3-540-45215-7_22
|View full text |Cite
|
Sign up to set email alerts
|

Context-Dependent Access Control for Web-Based Collaboration Environments with Role-Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2004
2004
2016
2016

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…Access privileges can also be linked to the method through which users authenticates themselves to the system (e.g. password versus biometrics) [20,26]. These previous works have shown that it is possible to augment existing security mechanisms with the ability to utilise contextual information to further enhance their security capabilities.…”
Section: Context Awareness Acquisition and Usagementioning
confidence: 96%
“…Access privileges can also be linked to the method through which users authenticates themselves to the system (e.g. password versus biometrics) [20,26]. These previous works have shown that it is possible to augment existing security mechanisms with the ability to utilise contextual information to further enhance their security capabilities.…”
Section: Context Awareness Acquisition and Usagementioning
confidence: 96%
“…In recent years various contributions have been made to the subjects of access control models and collaborations between organizations. A context-dependent RBAC model [1] has been proposed for enforcing access control in web-based collaboration environments. Organization-based access control (OrBAC) [2] was constructed using an RBAC model as the concrete level, and OrBAC in this case refers to common organizational contextual entities at the abstract level.…”
Section: Related Workmentioning
confidence: 99%
“…Nitsche et al [1998] gives a high-level description of a system extension that was implemented to consider context information for authorization decisions in medical workflows. Wolf and Schneider [2003] suggests to consider the authentication method that was applied to identify a particular subject (e.g., password-based versus certificate-based authentication) as context information to assign/activate certain roles. In Kang et al [2001], an approach for access control in interorganizational workflows is suggested, and Bertino et al [1999] presents a wellelaborated language and algorithms to express and enforce constraints, which ensure that all tasks within a workflow are performed by predefined users/roles.…”
Section: Related Workmentioning
confidence: 99%