Skip to main content

Comparative Analysis of Group Centric Access Control Models

  • Conference paper
Book cover Emerging Trends and Applications in Information Communication Technologies (IMTIC 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 281))

Included in the following conference series:

  • 1430 Accesses

Abstract

Digital information is one of the sensitive resources in any organization that needs to be well protected and secured to avoid unauthorized access and consequently its misuse. In a group centric environment dynamic sharing of resources takes place within an authorized group of users for a specific purpose. Security of shared resources becomes more important and challenging in a group-centric environment. Different organizations comprise of a complex structure in which multiple groups exist at a time and access rights are provisioned and delegated within groups. Groups are created and disassembled dynamically based on events or tasks required. These complex structures need to be managed and secured and we need effective provisioning of access control and delegation of access rights within these groups. We present a comparative study of the access control models in group-centric environment and discuss the open research areas in group centric environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Krishan, R., Sandhu, R.: Enforcement Architecture and Implementation Model for Group-Centric Information Sharing. In: Proc. of 1st International Workshop on Security and Comm. Networks (2009)

    Google Scholar 

  2. Krishan, R., Sandhu, R.: A hybrid Enforcement Model for Group-centric Secure Information Sharing. In: International Conference on Computational Science and Engineering (2009)

    Google Scholar 

  3. Moniruzzaman, M., Barker, K.: Delegation of Access Rights in a Privacy Preserving Access Control Model. In: Ninth Annual International Conference on Privacy, Security and Trust (2011)

    Google Scholar 

  4. Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: Towards a Framework for Group-Centric Secure Collaboration. In: 5th International Conference on Collaborative Computing: Networking, Applications and Work Sharing (2009)

    Google Scholar 

  5. Sandhu, R., Krishnan, R., Niu, J., Winsborough, W.H.: Group-Centric Models for Secure and Agile Information Sharing. In: Kotenko, I., Skormin, V. (eds.) MMM-ACNS 2010. LNCS, vol. 6258, pp. 55–69. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: Foundations for Group-Centric Secure Information Sharing Models. In: Proc. 14th ACM Symposium on Access Control Models and Technologies (SACMAT), Stresa, Italy, June 3-5, pp. 115–124 (2009)

    Google Scholar 

  7. Krishnan, R., Sandhu, R., Ranganathan, K.: PEI Models towards scalable, usable and high assurance information sharing. In: ACM Symposium on Access Control Models and Technologies, pp. 145–150. ACM, New York (2007)

    Chapter  Google Scholar 

  8. Krishnan, R., Sandhu, R., Niu, J., Winsborough, W.: A Conceptual Framework for Group-Centric Secure Information Sharing. In: Proc. 4th ACM Symposium on Information, Computer and Communications Security (AsiaCCS), Sydney, Australia, March 10-12, pp. 384–387 (2009)

    Google Scholar 

  9. Hu, V., Ferraiolo, D., Rick Kuhn, D.: Assessment of Access Control Systems, National Institute of Standards and Technology, U.S Department of Commerce (September 2006)

    Google Scholar 

  10. Tolone, W., Ahn, G.J., Pai, T., Hong, S.: Access Control in Collaborative System. ACM Computing Surveys 37(1), 29–41 (2005)

    Article  Google Scholar 

  11. Jansen, W.: Directions in Security Metrics Research, NISTIR 7564. National Institute of Standards and Technology, U.S Department of Commerce (April 2009)

    Google Scholar 

  12. Li, P.: A Times-Based Model for Group-centric Information Sharing. In: Second WRI Congress on Software Engineering (2010)

    Google Scholar 

  13. Li, P.: An Extended Model for Group-centric Secure Information Sharing. In: Third international Symposium on Electronic Commerce and Security (2010)

    Google Scholar 

  14. Thomas, R.K., and Sandhu, R.: Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security, August 11-13 (1997)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Anwar, H., Shibli, M.A. (2012). Comparative Analysis of Group Centric Access Control Models. In: Chowdhry, B.S., Shaikh, F.K., Hussain, D.M.A., Uqaili, M.A. (eds) Emerging Trends and Applications in Information Communication Technologies. IMTIC 2012. Communications in Computer and Information Science, vol 281. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28962-0_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28962-0_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28961-3

  • Online ISBN: 978-3-642-28962-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics