Proceedings of the 4th ACM Conference on Data and Application Security and Privacy 2014
DOI: 10.1145/2557547.2557566
|View full text |Cite
|
Sign up to set email alerts
|

On the suitability of dissemination-centric access control systems for group-centric sharing

Abstract: The Group-centric Secure Information Sharing (g-SIS) family of models has been proposed for modeling environments in which group dynamics dictate information-sharing policies and practices. This is in contrast to traditional, dissemination-centric sharing models, which focus on attaching policies to resources that limit their flow from producer to consumer. The creators of g-SIS speculate that it may not be strictly more expressive than dissemination-centric models, but that it nevertheless has pragmatic effic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…This indirection could be flattened to decrease the number of cryptographic operations on the critical path to file access; this would be akin to using an access matrix to encode RBAC 0 states. While this is possible, it has been shown to cause computational inefficiencies when roles' memberships or permissions are altered [29]; in our case this inefficiency would be amplified due to the cryptographic costs associated with these updates.…”
Section: Sumentioning
confidence: 91%
“…This indirection could be flattened to decrease the number of cryptographic operations on the critical path to file access; this would be akin to using an access matrix to encode RBAC 0 states. While this is possible, it has been shown to cause computational inefficiencies when roles' memberships or permissions are altered [29]; in our case this inefficiency would be amplified due to the cryptographic costs associated with these updates.…”
Section: Sumentioning
confidence: 91%
“…A related property is weak authorization preservation, defined in [15] (as weak AC-preservation). This property is a weakened version of authorization preservation: its intentions are similar, but the weak form can be used even when S and T do not support the exact same requests (i.e., simulating a system with requests of the form, "Does user u have access to permission p?"…”
Section: Dimension Qp: Query Preservationmentioning
confidence: 99%
“…Prior work has noted that practically evaluating an access control system must take into account the application in which the system is to be used, as well as additional cost metrics (e.g., computation, ease of use). This analysis problem has been identified as a system's suitability to a particular application [15], [16]. Suitability analysis formalizes an application's access control requirements (a workload), and uses expressiveness to prove that an access control system can satisfy those requirements.…”
Section: A Motivating Examplesmentioning
confidence: 99%
See 2 more Smart Citations