skip to main content
10.1145/2498328.2500080acmconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Consistency checking in privacy-aware access control

Published:04 April 2013Publication History

ABSTRACT

New access control models have been developed to accommodate the implementation of new privacy policies. One of these models is the P-RBAC model by Ni et al. [8] which supports a wide range of privacy policies. However, while modeling policies has become more complex, there has been only very limited support to verify the consistency of policies in an access control system. We extend the so-called condition component of the P-RBAC model to overcome some limitations on the expressive power of the model. Based on the extended P-RBAC model, we investigate an algorithm that detects conflicts and redundancies in the privacy policies.

References

  1. Ardagna, C., Vimercati, S. D. C. d., Neven, G., Paraboschi, S., Preiss, F., Samarati, P., Verdicchio, M. 2010. Enabling privacy-preserving credential-based access control with XACML and SAML. In Proc. of the 3rd IEEE International Symposium on Trust, Security and Privacy for Emerging Applications. TSP-10, 1090--1095. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Barker, S. 2010. Personalizing access control by generalizing access control. In Proc. of the Symposium on Access Control Models and Technologies. SACMAT'10, 149--158. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Biere, A., Heule, M., Van Maaren, H., Walsh, T. 2009. Handbook of Satisfiability. Frontiers in Artificial Intelligence and Applications 185. IOS Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Byun, J., Li, N. 2008. Purpose based access control for privacy protection in the relational database systems. The VLDB Journal 17, 4 (July 2008), 603--619. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Faresi, A. A., Wijesekera, D., Moidu, K. 2010. A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules. In Proc. of the 1st ACM International Health Informatics Symposium. IHI'10, 637--646. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ferraiolo, D. F., Sandhu, R., Serban G., Kuhn, D. R., Chandramouli, R. 2003. Proposed NIST standard for role-based access control. ACM Trans. on Information and System Security (TISSEC) 4, 3 (Aug. 2001), 224--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Karata, J., Karata, C., Brodiea, C., Fengb, J. 2005. Privacy in information technology: designing to enable privacy policy management in organizations, Int. Journal of HumanComputer Studies 63, 1--2 (July 2005), 153--174. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C., Karat, J., Trombetta, A. 2010. Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13, 3 (July 2010), 1--31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Ni, Q., Lin, D., Bertino, E., and Lobo, J. 2007. Conditional privacy-aware role based access control. 12th European Symposium On Research In Computer Security (Dresden, Germany, September 2007). ESORICS 2007. 72--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., Youman, C. E. 1996. Role-based access control models. IEEE Computer Society 29, 2 (February 1996), 38--47. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Consistency checking in privacy-aware access control

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    ACMSE '13: Proceedings of the 51st ACM Southeast Conference
                    April 2013
                    224 pages
                    ISBN:9781450319010
                    DOI:10.1145/2498328
                    • General Chair:
                    • Ashraf Saad

                    Copyright © 2013 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 4 April 2013

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article

                    Acceptance Rates

                    Overall Acceptance Rate178of377submissions,47%
                  • Article Metrics

                    • Downloads (Last 12 months)5
                    • Downloads (Last 6 weeks)0

                    Other Metrics

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader