xAccess: A unified user-centric access control framework for web applications

作者: K. Singh

DOI: 10.1109/NOMS.2012.6211948

关键词: Computer access controlComputer scienceWorld Wide WebThe InternetAccess controlWeb engineeringWeb applicationRole-based access controlWeb modelingUser-centered design

摘要: With the rapid growth of Web 2.0, users are contributing more and content on Internet, in form user profiles, blogs, reviews, etc. this increased sharing comes a pressing need for access control policies mechanisms to protect users' privacy. Access has remained largely centralized under web applications. Moreover, most applications either provide no or very primitive limited control. We argue that owner any piece data should be able decide how data. This argument hold not only data, but also users. In other words, choose their own models independent underlying work, we present novel framework, called xAccess, providing empowers they want accessed. xAccess is analogous single sign-on mechanism, however, instead login capability, it provides with point defining his one multiple On hand, enables individual use unified across applications; allows an application support different deployed by its model abstraction. demonstrate viability our design means platform prototype. The usability further evaluated developing sample using APIs.

参考文章(7)
R.S. Sandhu, Lattice-based access control models IEEE Computer. ,vol. 26, pp. 9- 19 ,(1993) , 10.1109/2.241422
Ravi Sandhu, Qamar Munawer, How to do discretionary access control using roles Proceedings of the third ACM workshop on Role-based access control. pp. 47- 54 ,(1998) , 10.1145/286884.286893
Amanda Stent, Rob Johnson, Michael Hart, More Content - Less Control: Access Control in the Web 2.0 ,(2006)
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, Role-based access control models IEEE Computer. ,vol. 29, pp. 38- 47 ,(1996) , 10.1109/2.485845
Wenke Lee, Ikpeme Erete, Kapil Singh, I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications Georgia Institute of Technology. ,(2010)
David F. Ferraiolo, Janet A. Cugini, David R. Kuhn, Role-Based Access Control (RBAC): Features and Motivations | NIST annual computer security applications conference. pp. 241- 248 ,(1995)
Nccer, Messaoud Benantar, Access Control Systems ,(2007)