Access control models need to be interoperable when administrative domains with heterogeneous access control models need to collaborate. Even, collaboration among homogeneous access control models is not straight-forward due to the different security orderings they might employ. In this paper, we briefly put forward an overlay formation mechanism based on chameleon hash functions. The mechanism allows collaborators to map their collaborating entities into a new collaboration specific security ordering that is agreeable to the peer collaborator. Collaborators use overlays as interoperation interfaces. By digitally signing each others' overlays, organizations enter into collaboration. Since overlays are virtual mappings, defining an overlay does not interfere with the access control model of the host organization. The use of overlays hides the internal security ordering of an organization from its collaborators. The trapdoor collision property of chameleon hash function ensures the privacy of collaboration agreements. Copyright 2007 ACM.

Addressing interoperability issues in access control models / T., Patil Vishwas; Mei, Alessandro; Mancini, Luigi Vincenzo. - (2007), pp. 389-391. (Intervento presentato al convegno 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 tenutosi a Singapore; Singapore nel 20 March 2007 through 22 March 2007) [10.1145/1229285.1229337].

Addressing interoperability issues in access control models

MEI, Alessandro;MANCINI, Luigi Vincenzo
2007

Abstract

Access control models need to be interoperable when administrative domains with heterogeneous access control models need to collaborate. Even, collaboration among homogeneous access control models is not straight-forward due to the different security orderings they might employ. In this paper, we briefly put forward an overlay formation mechanism based on chameleon hash functions. The mechanism allows collaborators to map their collaborating entities into a new collaboration specific security ordering that is agreeable to the peer collaborator. Collaborators use overlays as interoperation interfaces. By digitally signing each others' overlays, organizations enter into collaboration. Since overlays are virtual mappings, defining an overlay does not interfere with the access control model of the host organization. The use of overlays hides the internal security ordering of an organization from its collaborators. The trapdoor collision property of chameleon hash function ensures the privacy of collaboration agreements. Copyright 2007 ACM.
2007
2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07
access control; chameleon hash; interoperability; name spaces
04 Pubblicazione in atti di convegno::04b Atto di convegno in volume
Addressing interoperability issues in access control models / T., Patil Vishwas; Mei, Alessandro; Mancini, Luigi Vincenzo. - (2007), pp. 389-391. (Intervento presentato al convegno 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07 tenutosi a Singapore; Singapore nel 20 March 2007 through 22 March 2007) [10.1145/1229285.1229337].
File allegati a questo prodotto
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11573/207341
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 10
  • ???jsp.display-item.citation.isi??? ND
social impact