Purpose-based access control policies and conflicting analysis

Hua Wang, Lili Sun, Vijay Varadharajan

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

9 Citations (Scopus)

Abstract

This paper proposes a purpose-based framework for supporting privacy preserving access control policies and mechanisms. The mechanism enforces access policy to data containing personally identifiable information. The key component of the framework is purpose involved access control models (PAC) that provide full support for expressing highly complex privacy-related policies, taking into account features like purposes and conditions. A policy refers to an access right that a subject can have on an object, based on attribute predicates, obligation actions, and system conditions. Policy conflicting problems may arise when new access policies are generated. The structure of purpose involved access control policy is studied, and efficient conflict-checking algorithms are developed. Finally a discussion of our work in comparison with other access control and frameworks such as EPAL is presented.

Original languageEnglish
Title of host publicationSecurity and Privacy - Silver Linings in the Cloud - 25th IFIP TC 11 International InformationSecurity Conference, SEC 2010 Held as Part of WCC 2010, Proceedings
EditorsKai Rannenberg, Vijay Varadharajan, Christian Weber
Place of PublicationLaxenburg, Austria
PublisherIFIP
Pages217-228
Number of pages12
Volume330
ISBN (Print)3642152562, 9783642152566, 9783642152566
DOIs
Publication statusPublished - 2010
Event25th IFIP TC 11 International Information Security Conference, SEC 2010 - Brisbane QLD, Australia
Duration: 20 Sept 201023 Sept 2010

Publication series

NameIFIP Advances in Information and Communication Technology
Volume330
ISSN (Print)18684238

Other

Other25th IFIP TC 11 International Information Security Conference, SEC 2010
Country/TerritoryAustralia
CityBrisbane QLD
Period20/09/1023/09/10

Keywords

  • Access Control
  • Conflicts
  • Privacy
  • Purpose

Fingerprint

Dive into the research topics of 'Purpose-based access control policies and conflicting analysis'. Together they form a unique fingerprint.

Cite this