Label-Based Access Control Policy Enforcement and Management

Wei Zhou, V.h. Raja, C. Meinel, M. Ahmad

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    201 Downloads (Pure)

    Abstract

    To effectively participate in modern collaborations, member organizations must be able to share specific data and functionality with collaboration partners, while ensuring their resources are safe from inappropriate access. This requires access control models, policies, and enforcement mechanisms for the shared resources. This paper specifically addresses how to reduce the information leaks caused by authorization policies used in collaborative computing environment. The basic principle is defining some labels that specify the information flow constraints, and assigning them to authorization policy components. The usages of labeled policy components must obey the information fiows constraints defined by the labels in order to avoid authorization policy components being misused. This label can also improve the authorization policy administration.
    Original languageEnglish
    Title of host publicationProceedings of the 7th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
    PublisherIEEE
    Pages395-400
    ISBN (Print) 0-7695-2611-X
    DOIs
    Publication statusPublished - 20 Jun 2006

    Bibliographical note

    Author can archive publisher's version/PDF. For full details see http://www.sherpa.ac.uk/romeo/ [Accessed 29/04/2010]

    Fingerprint

    Dive into the research topics of 'Label-Based Access Control Policy Enforcement and Management'. Together they form a unique fingerprint.

    Cite this