Abstract
The basic primitives of access control models evolve together with the development of new technologies. The increased availability of computers in organizations brought the notion of roles in, the growing popularity of online social networks led to access control models based on relationships. The new era introduces new challenges. One of those is related to data management in collaborative platforms. Being involved in numerous collaborations, the users need convenient solutions to express their access control preferences. In this paper we address this problem by developing an access control model based on categorization. Relying on evidence from cognitive science, we employ categories as a natural primitive for expressing users’ access control preferences. We develop our model using a fragment of hybrid logic and evaluate its performance in a simulated environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ahmed, T., Patwa, F., Sandhu, R.: Object-to-object relationship-based access control: model and multi-cloud demonstration. In: 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), pp. 297–304. IEEE (2016)
Augoustinos, M., Walker, I., Donaghue, N.: Social Cognition: An Integrated Introduction. Sage (2014)
Barker, S.: The next 700 access control models or a unifying meta-model? In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, pp. 187–196. Association for Computing Machinery, New York, NY, USA (2009). https://doi.org/10.1145/1542207.1542238
Bell, D.E., Padula, L.J.L.: Secure computer system: unified exposition and multics interpretation (1976)
Blackburn, P., Seligman, J.: Hybrid languages. J. Logic Lang. Inform. 4, 251–272 (1995)
Bruns, G., Fong, P.W., Siahaan, I., Huth, M.: Relationship-based access control: its expression and enforcement through hybrid logic. In: Proceedings of the Second ACM Conference on Data and Application Security and Privacy, pp. 117–124 (2012)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: A semantic web based framework for social network access control. In: Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, pp. 177–186 (2009)
Carminati, B., Ferrari, E., Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Semantic web-based social network access control. Comput. Secur. 30(2–3), 108–115 (2011)
Crampton, J., Sellwood, J.: Relationships, paths and principal matching: a new approach to access control. arXiv preprint arXiv:1505.07945 (2015)
Damen, S., Hartog, J., Zannone, N.: CollAc: collaborative access control, pp. 142–149 (2014). https://doi.org/10.1109/CTS.2014.6867557
Denning, D.E.: A lattice model of secure information flow. Commun. ACM 19(5), 236–243 (1976)
Eysenck, M.W., Brysbaert, M.: Fundamentals of Cognition. Routledge (2018)
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. (TISSEC) 2(1), 34–64 (1999)
Fong, P.W.: Relationship-based access control: protection model and policy language. In: Proceedings of the first ACM Conference on Data and Application Security and Privacy, pp. 191–202 (2011)
Hagberg, A.A., Schult, D.A., Swart, P.J.: Exploring network structure, dynamics, and function using NetworkX. In: Varoquaux, G., Vaught, T., Millman, J. (eds.) Proceedings of the 7th Python in Science Conference, Pasadena, CA, USA, pp. 11–15 (2008)
Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Discovery Data (TKDD) 1(1), 2-es (2007)
Paci, F., Squicciarini, A., Zannone, N.: Survey on access control for community-centered collaborative systems. ACM Comput. Surv. (CSUR) 51(1), 1–38 (2018)
Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. (CSUR) 37(1), 29–41 (2005)
Wilkinson, M.D., et al.: The fair guiding principles for scientific data management and stewardship. Sci. Data 3(1), 1–9 (2016)
Acknowledgements
This work was co-funded by the European Research Council for the project ScienceGRAPH (Grant agreement ID: 819536) and the TIB Leibniz Information Centre for Science and Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Obrezkov, D., Sohr, K. (2024). UCAT: The Uniform Categorization for Access Control. In: Mosbah, M., Sèdes, F., Tawbi, N., Ahmed, T., Boulahia-Cuppens, N., Garcia-Alfaro, J. (eds) Foundations and Practice of Security. FPS 2023. Lecture Notes in Computer Science, vol 14552. Springer, Cham. https://doi.org/10.1007/978-3-031-57540-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-57540-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-57539-6
Online ISBN: 978-3-031-57540-2