Skip to main content

Mobi-CoSWAC: An Access Control Approach for Collaborative Scientific Workflow in Mobile Environment

  • Conference paper
Pervasive Computing and the Networked World (ICPCA/SWS 2012)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 7719))

  • 3901 Accesses

Abstract

With the development of mobile technology and popularity of pervasive applications, more and more scientific collaborative research works are carried out in the wild or on the move. How to make an optimal tradeoff between deep collaboration and strict access control in mobile environments is a challenging work. In this paper, we propose Mobi-CoSWAC, an access control approach for collaborative scientific workflow in mobile environments. In our approach, ranked access permissions will be provided to users for continuous collaboration in disconnected settings, as well as the owned access permissions can be dynamically assigned according to the role’s evolution in various mobile contexts. The model and access control algorithms of Mobi-CoSWAC are elaborated and a prototype is implemented on Android mobile devices in collaborative proteomics research platform CoPExplorer to demonstrate its effectiveness.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Deelman, et al.: Workflows and e-Science: An overview of workflow system features and capabilities. Future Generation Computer Systems 25(5), 528–540 (2009)

    Google Scholar 

  2. Goecks, J., Nekrutenko, A., Taylor, J.: Galaxy: a comprehensive approach for supporting accessible, reproducible, and transparent computational research in the life sciences. Genome. Biol. 11(8), R86 (2010)

    Google Scholar 

  3. Saito, Y., Shapiro, M.: Optimistic replication. ACM Computing Surveys (CSUR) 37(1), 42–81 (2005)

    Article  Google Scholar 

  4. Alexander, M., Christiane, M., Manfred, T., Erika, R.: Mobile work efficiency: enhancing workflows with mobile devices. In: Proc. HCIMDS (2011)

    Google Scholar 

  5. Ferraiolo, D.F., Sandhu, R., et al.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Inf. Syst. Secur. 4(3), 222–274 (2001)

    Article  Google Scholar 

  6. Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1), 65–104 (1999)

    Article  Google Scholar 

  7. Thomas, R., Sandhu, R.: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. Database Security 11, 166–181 (1998)

    Google Scholar 

  8. Oh, S., Park, S.: Task-role-based access control model. Information Systems 28(6), 533–562 (2003)

    Article  MATH  Google Scholar 

  9. Kulkarni, D., Tripathi, A.: Context-aware role-based access control in pervasive computing systems. In: Proc. of SACMAT 2008, pp. 113–122 (2008)

    Google Scholar 

  10. Banerjee, A., Naumann, D.A.: History-Based Access Control and Secure Information Flow. In: Barthe, G., Burdy, L., Huisman, M., Lanet, J.-L., Muntean, T. (eds.) CASSIS 2004. LNCS, vol. 3362, pp. 27–48. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Abadi, M., Fournet, C.: Access control based on execution history. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, pp. 107–121 (2003)

    Google Scholar 

  12. Zhai, G., Lu, T., et al.: PWMDS: A system supporting provenance-based matching and discovery of workflows in proteomics data analysis. In: CSCWD 2012, pp. 456–463 (2012)

    Google Scholar 

  13. Crampton, J.: Specifying and enforcing constraints in role-based access control. In: Proc. of SACMAT 2003, pp. 43–50 (2003)

    Google Scholar 

  14. Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inf. Syst. Secur. 12(1), 1 (2008)

    Article  Google Scholar 

  15. Hansen, F., Oleshchuk, V.: Spatial role-based access control model for wireless networks. In: Proc. of VTC 2003, vol. 3, pp. 2093–2097 (2003)

    Google Scholar 

  16. Kirkpatrick, M.S., Bertino, E.: Enforcing spatial constraints for mobile rbac systems. In: SACMAT 2010, pp. 99–108 (2010)

    Google Scholar 

  17. Cruz, I.F., Gjomemo, R., Lin, B., Orsini, M.: A location aware role and attribute based access control system. In: Proc. of GIS 2008, p. 84 (2008)

    Google Scholar 

  18. Hanane, E.-B., Hamid, H.: RB-WAC: New Approach for Access Control in Workflows. In: AICCSA, May 10-13, pp. 637–640 (2009)

    Google Scholar 

  19. Leitner, M., Rinderle-Ma, S., Mangler, J.: AW-RBAC: Access Control in Adaptive Workflow Systems. In: ARES, pp. 27–34 (2011)

    Google Scholar 

  20. Park, S.-H., Eom, J.-H., Chung, T.-M.: A Study on Access Control Model for Context-Aware Workflow. In: 2009 Fifth International Joint Conference on INC, IMS and IDC, August 25-27, pp. 1526–1531 (2009)

    Google Scholar 

  21. Le, X.H., Doll, T., Barbosu, M., Luque, A., Wang, D.: An Enhancement of the Role-Based Access Control Model to Facilitate Information Access Management in Context of Team Collaboration and Workflow. Biomedical Informatics (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, Z., Lu, T., Liu, T., Gu, N. (2013). Mobi-CoSWAC: An Access Control Approach for Collaborative Scientific Workflow in Mobile Environment. In: Zu, Q., Hu, B., Elçi, A. (eds) Pervasive Computing and the Networked World. ICPCA/SWS 2012. Lecture Notes in Computer Science, vol 7719. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37015-1_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37015-1_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37014-4

  • Online ISBN: 978-3-642-37015-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics