Hdl Handle:
http://hdl.handle.net/10149/58382
Title:
Label-based access control policy enforcement and management
Authors:
Zhou, W. (Wei); Raja, V. H. (Vinesh); Meinel, C. (Christoph); Ahmad, M. M. (Munir)
Affiliation:
University of Warwick. School of Engineering; University of Potsdam. Hasso-Plattner-Institute. Germany; University of Teesside. B2B Manufacturing Centre.
Citation:
Zhou, W. et al. (2006) 'Label-based access control policy enforcement and management', Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006, pp.395-400.
Publisher:
IEEE
Conference:
7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2006, including Second ACIS Int. Worshop on SAWN 2006.
Issue Date:
2006
URI:
http://hdl.handle.net/10149/58382
Abstract:
To effectively participate in modern collaborations, member organizations must be able to share specific data and functionality with collaboration partners, while ensuring their resources are safe from inappropriate access. This requires access control models, policies, and enforcement mechanisms for the shared resources. This paper specifically addresses how to reduce the information leaks caused by authorization policies used in collaborative computing environment. The basic principle is defining some labels that specify the information flow constraints, and assigning them to authorization policy components. The usages of labeled policy components must obey the information fiows constraints defined by the labels in order to avoid authorization policy components being misused. This label can also improve the authorization policy administration.
Type:
Meetings and Proceedings
Keywords:
authorization policy; policy enforcement; law enforcement
ISBN:
0-7695-2611-X
Rights:
Author can archive publisher's version/PDF. For full details see http://www.sherpa.ac.uk/romeo/ [Accessed 29/04/2010]
Citation Count:
1 [Scopus, 19/01/2010]

Full metadata record

DC FieldValue Language
dc.contributor.authorZhou, W. (Wei)-
dc.contributor.authorRaja, V. H. (Vinesh)-
dc.contributor.authorMeinel, C. (Christoph)-
dc.contributor.authorAhmad, M. M. (Munir)-
dc.date.accessioned2009-04-01T10:50:37Z-
dc.date.available2009-04-01T10:50:37Z-
dc.date.issued2006-
dc.identifier.isbn0-7695-2611-X-
dc.identifier.urihttp://hdl.handle.net/10149/58382-
dc.description.abstractTo effectively participate in modern collaborations, member organizations must be able to share specific data and functionality with collaboration partners, while ensuring their resources are safe from inappropriate access. This requires access control models, policies, and enforcement mechanisms for the shared resources. This paper specifically addresses how to reduce the information leaks caused by authorization policies used in collaborative computing environment. The basic principle is defining some labels that specify the information flow constraints, and assigning them to authorization policy components. The usages of labeled policy components must obey the information fiows constraints defined by the labels in order to avoid authorization policy components being misused. This label can also improve the authorization policy administration.-
dc.publisherIEEE-
dc.rightsAuthor can archive publisher's version/PDF. For full details see http://www.sherpa.ac.uk/romeo/ [Accessed 29/04/2010]-
dc.subjectauthorization policy-
dc.subjectpolicy enforcement-
dc.subjectlaw enforcement-
dc.titleLabel-based access control policy enforcement and management-
dc.typeMeetings and Proceedings-
dc.contributor.departmentUniversity of Warwick. School of Engineering; University of Potsdam. Hasso-Plattner-Institute. Germany; University of Teesside. B2B Manufacturing Centre.-
dc.identifier.conference7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2006, including Second ACIS Int. Worshop on SAWN 2006.-
ref.assessmentRAE 2008-
ref.citationcount1 [Scopus, 19/01/2010]-
or.citation.harvardZhou, W. et al. (2006) 'Label-based access control policy enforcement and management', Proceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 2006, pp.395-400.-
All Items in TeesRep are protected by copyright, with all rights reserved, unless otherwise indicated.