I Own, I Provide, I Decide: Generalized User-Centric Access Control Framework for Web Applications

作者: Wenke Lee , Ikpeme Erete , Kapil Singh

DOI:

关键词:

摘要: With the rapid growth of Web 2.0 technologies, users are contributing more and more content on the Internet, in the form of user profiles, blogs, reviews, etc. With this increased …

参考文章(20)
Amir H. Chinaei, Frank Wm. Tompa, User-managed access control for health care systems very large data bases. pp. 63- 72 ,(2005) , 10.1007/11552338_5
R.S. Sandhu, Lattice-based access control models IEEE Computer. ,vol. 26, pp. 9- 19 ,(1993) , 10.1109/2.241422
Ravi Sandhu, Qamar Munawer, How to do discretionary access control using roles Proceedings of the third ACM workshop on Role-based access control. pp. 47- 54 ,(1998) , 10.1145/286884.286893
Ninghui Li, Qihua Wang, Mahesh Tripunitara, Resiliency Policies in Access Control ACM Transactions on Information and System Security. ,vol. 12, pp. 1- 34 ,(2009) , 10.1145/1513601.1513602
Elisa Bertino, Jianping Fan, Elena Ferrari, Mohand-Said Hacid, Ahmed K. Elmagarmid, Xingquan Zhu, A hierarchical access control model for video database systems ACM Transactions on Information Systems. ,vol. 21, pp. 155- 191 ,(2003) , 10.1145/763693.763695
Barbara Carminati, Elena Ferrari, Andrea Perego, Enforcing access control in Web-based social networks ACM Transactions on Information and System Security. ,vol. 13, pp. 1- 38 ,(2009) , 10.1145/1609956.1609962
Ji-Won Byun, Elisa Bertino, Ninghui Li, Purpose based access control of complex data for privacy protection symposium on access control models and technologies. pp. 102- 110 ,(2005) , 10.1145/1063979.1063998
William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick McDaniel, Protecting users from "themselves" workshop on computer security architecture. pp. 29- 36 ,(2007) , 10.1145/1314466.1314472
Dorothy E. Denning, A lattice model of secure information flow Communications of the ACM. ,vol. 19, pp. 236- 243 ,(1976) , 10.1145/360051.360056