Secure information sharing using role-based delegation

Gail Joon Ahn, Badrinath Mohan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Scopus citations

Abstract

As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Technology
Subtitle of host publicationCoding Computing, ITCC 2004
PublisherIEEE Computer Society
Pages810-815
Number of pages6
ISBN (Print)0769521088, 9780769521084
DOIs
StatePublished - 2004
Externally publishedYes
EventInternational Conference on Information Technology: Coding Computing, ITCC 2004 - Las Vegas, NV, United States
Duration: Apr 5 2004Apr 7 2004

Publication series

NameInternational Conference on Information Technology: Coding Computing, ITCC
Volume2

Other

OtherInternational Conference on Information Technology: Coding Computing, ITCC 2004
CountryUnited States
CityLas Vegas, NV
Period4/5/044/7/04

Keywords

  • Delegation
  • Information Sharing
  • Role-based

ASJC Scopus subject areas

  • Software
  • Information Systems
  • Engineering(all)

Fingerprint Dive into the research topics of 'Secure information sharing using role-based delegation'. Together they form a unique fingerprint.

Cite this