Paper Title:
The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing
  Abstract

In this paper, we propose a temporal-based aythorization model for Group-centric Secure Information Sharing(g-SIS) . The traditional approach to information sharing focuses on attaching attributes and policies to an object as it is disseminated from producer to consumers in a system. In contrast, group-centric sharing brings subjects and objects together in a group to facilitate sharing. In such contexts, authorizations are influenced by the temporal ordering of subject and object group membership. That is, the authorizations are decided by the time that subject joins group and the time that object is added to group. But, the model doesn’t consider the time constraint of group enabling and access enabling. For example, a secure meeting room is open only at 8:00—10:00 am and 15:00—17:00 pm every Monday. We develop a temporal-based authorization model for group-centric information sharing which takes the temporal intervals of group and access enabling into consideration. We also discuss a usage scenario to illustrate practical application in secure meeting system.

  Info
Periodical
Advanced Materials Research (Volumes 143-144)
Edited by
H. Wang, B.J. Zhang, X.Z. Liu, D.Z. Luo, S.B. Zhong
Pages
1223-1227
DOI
10.4028/www.scientific.net/AMR.143-144.1223
Citation
P. W. Li, "The Research of Temporal-Based Authorization for Group-Centric Secure Information Sharing", Advanced Materials Research, Vols. 143-144, pp. 1223-1227, 2011
Online since
October 2010
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yuan Cao, Lin Yang, Zom Bo Fu, Feng Yang
Abstract:This paper provides an overview of identity management architecture from the viewpoint of paradigms and models. The definition of identity...
647
Authors: Chao Yan, Shou Jian Yu
Chapter 5: Information Processing and Computational Science
Abstract:A data-centric approach to business process and workflow modeling has been emerging over the past several years. But various research...
1140
Authors: Xu Min Song, Qi Lin, Yong Chen
Chapter 5: Computation Methods and Algorithms for Modeling, Simulation and Optimization, Data Mining and Data Processing
Abstract:Aiming at the characters and requirements of spacecraft design, simulation and test, The test-bed framework was studied in this paper. The...
1955
Authors: Kang Yu, Zhen Bang Chen, Wei Dong
Chapter 4: Communication, Networks, Applied Information Technologies, Algorithms and Data Processing
Abstract:For some key fields like energy, traffic, etc., the system software has high reliability demands, so that monitors not only need to pay...
333