Secure information sharing using role-based delegation

Gail-Joon Ahn, Badrinath Mohan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Technology: Coding Computing, ITCC
EditorsP.K. Srimani, A. Abraham, M. Cannataro, J. Domingo-Ferrer, R. Hashemi
Pages810-815
Number of pages6
Volume2
StatePublished - 2004
Externally publishedYes
EventInternational Conference on Information Technology: Coding Computing, ITCC 2004 - Las Vegas, NV, United States
Duration: Apr 5 2004Apr 7 2004

Other

OtherInternational Conference on Information Technology: Coding Computing, ITCC 2004
CountryUnited States
CityLas Vegas, NV
Period4/5/044/7/04

Fingerprint

Ubiquitous computing
Personnel

Keywords

  • Delegation
  • Information Sharing
  • Role-based

ASJC Scopus subject areas

  • Engineering(all)

Cite this

Ahn, G-J., & Mohan, B. (2004). Secure information sharing using role-based delegation. In P. K. Srimani, A. Abraham, M. Cannataro, J. Domingo-Ferrer, & R. Hashemi (Eds.), International Conference on Information Technology: Coding Computing, ITCC (Vol. 2, pp. 810-815)

Secure information sharing using role-based delegation. / Ahn, Gail-Joon; Mohan, Badrinath.

International Conference on Information Technology: Coding Computing, ITCC. ed. / P.K. Srimani; A. Abraham; M. Cannataro; J. Domingo-Ferrer; R. Hashemi. Vol. 2 2004. p. 810-815.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ahn, G-J & Mohan, B 2004, Secure information sharing using role-based delegation. in PK Srimani, A Abraham, M Cannataro, J Domingo-Ferrer & R Hashemi (eds), International Conference on Information Technology: Coding Computing, ITCC. vol. 2, pp. 810-815, International Conference on Information Technology: Coding Computing, ITCC 2004, Las Vegas, NV, United States, 4/5/04.
Ahn G-J, Mohan B. Secure information sharing using role-based delegation. In Srimani PK, Abraham A, Cannataro M, Domingo-Ferrer J, Hashemi R, editors, International Conference on Information Technology: Coding Computing, ITCC. Vol. 2. 2004. p. 810-815
Ahn, Gail-Joon ; Mohan, Badrinath. / Secure information sharing using role-based delegation. International Conference on Information Technology: Coding Computing, ITCC. editor / P.K. Srimani ; A. Abraham ; M. Cannataro ; J. Domingo-Ferrer ; R. Hashemi. Vol. 2 2004. pp. 810-815
@inproceedings{d9fd73fdd0be4b01a6389a57105eb6e7,
title = "Secure information sharing using role-based delegation",
abstract = "As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.",
keywords = "Delegation, Information Sharing, Role-based",
author = "Gail-Joon Ahn and Badrinath Mohan",
year = "2004",
language = "English (US)",
isbn = "0769521088",
volume = "2",
pages = "810--815",
editor = "P.K. Srimani and A. Abraham and M. Cannataro and J. Domingo-Ferrer and R. Hashemi",
booktitle = "International Conference on Information Technology: Coding Computing, ITCC",

}

TY - GEN

T1 - Secure information sharing using role-based delegation

AU - Ahn, Gail-Joon

AU - Mohan, Badrinath

PY - 2004

Y1 - 2004

N2 - As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.

AB - As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.

KW - Delegation

KW - Information Sharing

KW - Role-based

UR - http://www.scopus.com/inward/record.url?scp=3042682378&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=3042682378&partnerID=8YFLogxK

M3 - Conference contribution

SN - 0769521088

VL - 2

SP - 810

EP - 815

BT - International Conference on Information Technology: Coding Computing, ITCC

A2 - Srimani, P.K.

A2 - Abraham, A.

A2 - Cannataro, M.

A2 - Domingo-Ferrer, J.

A2 - Hashemi, R.

ER -