Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies 2002
DOI: 10.1145/507711.507726
|View full text |Cite
|
Sign up to set email alerts
|

Information sharing and security in dynamic coalitions

Abstract: Today, information sharing is critical to almost every institution. There is no more critical need for information sharing than during an international crisis, when international coalitions dynamically form. In the event of a crisis, whether it is humanitarian relief, natural disaster, combat operations, or terrorist incidents, international coalitions have an immediate need for information. These coalitions are formed with international cooperation, where each participating country offers whatever resources i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(11 citation statements)
references
References 13 publications
0
11
0
Order By: Relevance
“…This stream has resulted in a number of coalition-based access control models [Cohen et al 2002;Phillips et al 2002;Atluri and Warner 2004;Trivellato et al 2013] and workflow-based access control models [Kang et al 2001;Wainer et al 2003]. These models usually extend earlier access control models like RBAC, TBAC and TMAC to address requirements typical of inter-organizational resource sharing.…”
Section: Overview On Conventional Access Control Modelsmentioning
confidence: 99%
“…This stream has resulted in a number of coalition-based access control models [Cohen et al 2002;Phillips et al 2002;Atluri and Warner 2004;Trivellato et al 2013] and workflow-based access control models [Kang et al 2001;Wainer et al 2003]. These models usually extend earlier access control models like RBAC, TBAC and TMAC to address requirements typical of inter-organizational resource sharing.…”
Section: Overview On Conventional Access Control Modelsmentioning
confidence: 99%
“…In the SaaS cloud application platform, access control model is the most commonly used is RBAC (Role Based Access Control) model. In order to solve the defects of the traditional access control model applied in the open adn dynamic environment application, researchers have extended the RBAC model adapt to the cloud services, including IRBAC2000 [3], A-IRBAC2000 [4], DRBAC [5], X-RBAC [6], ABAC [7] [8], TBAC [9] [10], TRBAC [11], BTRBAC [12] and UCON [13] [14]. These models implement the access control based the role.…”
Section: Analysis Of the Traditional Access Control Modelmentioning
confidence: 99%
“…However, it has no provision to limit the transitive trust. PERMIS [8] is another model that is based on RBAC like [5] and [7]. It focuses on authorization only.…”
Section: Pos(isgc 2011 and Ogf 31)024mentioning
confidence: 99%