A FLEXIBLE AND SECURE ACCESS CONTROL SCHEME USING SOCIAL BEHAVIOR IN REAL WORLD
Keywords:
access control, socialware, symbiotic computing, collaborative workAbstract
A social network is viewed as a set of people or organizations connected by a set of social relationships, such as friendship or common interests. In the past people would rely on the friends or close associates for information. Today, they search in the web for such information and opinion. And access control to resources is one of the most important technologies for supporting human activities in the digital space, where confidentiality and secure data handling are two most important issues for any such social network users. To realize this control two schemes were proposed: RBAC (Role-Based Access Control) [1] and TRBAC (Temporal Role-Based Access Control) [2] by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities because of high maintenance costs and inadequacy in safeness. In this paper, we focus on a flexible and secure access control in the real space, by using relations with users and situations, and propose a novel access control which is effective for temporal activities. We evaluate our proposed scheme by implementing a prototype system which shows the effectiveness of this method.
Downloads
References
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, “Role-Based Access Control Model”,
Computer, vol. 29, no. 2, pp. 38-47, 1996.
E. Bertino, P.A. Bonatti, and E. Ferrari, “TRBAC: A Temporal Role-Based Access Control
Model”, ACM Trans. Information and System Security, vol. 4, no. 3, pp. 191-233, Aug. 2001.
Tetsuo Kinoshita, Susumo Konno, Gen Kitagata, Takahiro Uchiya, Hideki Hara, “Symbiotic Sys-
tem: Co-existence and Mutual Respect of Human, Society, Environment, and Information System,
Forward: Socialware”, IPSJ, Vol.47, No.8, pp.817-824, 2006.
Mohsen Jamali, Hassan Abolhassani, “Different Aspects of Social Network Analysis”, Proceedings
of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence, Dec. 2006, pp. 66-72.
Filipe Beato, Karkulf Kohlweiss, and Karel Wouters, “Enforcing Access Control in Social Network
Sites”, The 9th Privacy Enhancing Technologies (PETA 2009), Aug. 5-7, 2009. Seattle, WA, USA.
Amin Tootoonchian, Kiran K. Gollu, Stefan Saroiu, Yashar Ganjali, Alec Wolman, “Lockr: Social
Access Control for Web 2.0”, WOSN’08, Seattle, Washington, USA, August 18, 2008.
S.E.Chang, M.S.H. Heng, “An Empirical Study on Voice Enabled Web Applications”, IEEE Per-
vasive Computing, IEEE, Jul.-Sept. 2006, pp. 76-81.
J.A.Q. Ruiz, J.R.M. Sanchez, “Design of a VoiceXML Gateway”, Proc. 2003 4th Mexican Inter-
national Conference on Computer Science, IEEE CS, Sept. 2003, pp. 49-53.
Stan Kurkovsky, David Strimple, Eric Nuzzi, Kerry Verdecchia, “Mobile Voice Access in Social
Networking Systems”, 5th International Conference on Information Technology - New Generations,
Las Vegas, Nevada, April 7-9, 2008.
Masahiro Nagao, Glenn Mansfield Keeni, Masahiro Ishigaki, Atsushi Togashi, Shoichi Noguchi, “A
Secure Distributed Database System with Time-series Data and Social-Relation Based Information
Access Control”, IEICE Technical Report, Vol.107, No.6, pp.55-60,2007.
S. Fujita, H. Hara, K. Sugawara, T. Kinoshita, and N. Shiratori, “Agent-based design model of
adaptive distributed systems”, The International Journal of Artificial Intelligence, Neural Net-
works and Complex Problem-Solving Technologies, Vol. 9, No. 1, pp. 57-70, 1998.
Takahiro Uchiya, Takahide Maemura, Kenji Sugawara, Tetsuo Kinoshita, “Interactive Design En-
vironment for Agent-Based System”, Transaction of the Institute of Electronics, Information and
Communication Engineers. D-I, Vol.J88-D-I, No.9, pp. 1344-1355.