Abstract
Digital information is one of the sensitive resources in any organization that needs to be well protected and secured to avoid unauthorized access and consequently its misuse. In a group centric environment dynamic sharing of resources takes place within an authorized group of users for a specific purpose. Security of shared resources becomes more important and challenging in a group-centric environment. Different organizations comprise of a complex structure in which multiple groups exist at a time and access rights are provisioned and delegated within groups. Groups are created and disassembled dynamically based on events or tasks required. These complex structures need to be managed and secured and we need effective provisioning of access control and delegation of access rights within these groups. We present a comparative study of the access control models in group-centric environment and discuss the open research areas in group centric environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Krishan, R., Sandhu, R.: Enforcement Architecture and Implementation Model for Group-Centric Information Sharing. In: Proc. of 1st International Workshop on Security and Comm. Networks (2009)
Krishan, R., Sandhu, R.: A hybrid Enforcement Model for Group-centric Secure Information Sharing. In: International Conference on Computational Science and Engineering (2009)
Moniruzzaman, M., Barker, K.: Delegation of Access Rights in a Privacy Preserving Access Control Model. In: Ninth Annual International Conference on Privacy, Security and Trust (2011)
Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: Towards a Framework for Group-Centric Secure Collaboration. In: 5th International Conference on Collaborative Computing: Networking, Applications and Work Sharing (2009)
Sandhu, R., Krishnan, R., Niu, J., Winsborough, W.H.: Group-Centric Models for Secure and Agile Information Sharing. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 55–69. Springer, Heidelberg (2010)
Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: Foundations for Group-Centric Secure Information Sharing Models. In: Proc. 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, pp. 115–124 (2009)
Krishnan, R., Sandhu, R., Ranganathan, K.: PEI Models towards scalable, usable and high assurance information sharing. In: ACM Symposium on Access Control Models and Technologies, pp. 145–150. ACM, New York (2007)
Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: A Conceptual Framework for Group-Centric Secure Information Sharing. In: Proc. 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, pp. 384–387 (2009)
Hu, V., Ferraiolo, D., Rick Kuhn, D.: Assessment of Access Control Systems, National Institute of Standards and Technology, U.S Department of Commerce (September 2006)
Tolone, W., Ahn, G.J., Pai, T., Hong, S.: Access Control in Collaborative System. ACM Computing Surveys 37(1), 29–41 (2005)
Jansen, W.: Directions in Security Metrics Research, NISTIR 7564. National Institute of Standards and Technology, U.S Department of Commerce (April 2009)
Li, P.: A Times-Based Model for Group-centric Information Sharing. In: Second WRI Congress on Software Engineering (2010)
Li, P.: An Extended Model for Group-centric Secure Information Sharing. In: Third international Symposium on Electronic Commerce and Security (2010)
Thomas, R.K., and Sandhu, R.: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, August 11-13 (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Anwar, H., Shibli, M.A. (2012). Comparative Analysis of Group Centric Access Control Models. In: Chowdhry, B.S., Shaikh, F.K., Hussain, D.M.A., Uqaili, M.A. (eds) Emerging Trends and Applications in Information Communication Technologies. IMTIC 2012. Communications in Computer and Information Science, vol 281. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28962-0_12
Download citation
DOI: https://doi.org/10.1007/978-3-642-28962-0_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-28961-3
Online ISBN: 978-3-642-28962-0
eBook Packages: Computer ScienceComputer Science (R0)