Abstract
Shared workspaces and Web 2.0 platforms provide lots of services for sharing various objects. Most current shared workspaces and Web 2.0 platforms provide role-based, coarse-grained access control policies which undermine the utility of them in some cases. In this paper, we present Annotation-Based Access Control, an approach towards access control which benefits from user annotations to annotate people using various fixed and desired open vocabulary (tags) and helps to build a more flexible access control mechanism based on relationships among different types of users. We also present a prototype, a gadget called Uncle-Share, which we have developed to enable this access control mechanism and evaluate it.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alotaiby, F.T., Chen, J.X.: A Model for Team-based Access Control. In: International Conference on Information Technology: Coding and Computing. IEEE Computer Society, Los Alamitos (2004)
Berners-Lee, T., Hendler, J., Lassila, O.: The Semantic Web, A new form of Web content that is meaningful to computers will unleash a revolution of new possibilities. Scientific American (2001)
Carminati, B., Ferrari, E., Perego, A.: Rule-Based Access Control for Social Networks. In: OTM Workshops (2), pp. 1734–1744. Springer, Heidelberg (2006)
Carminati, B., Ferrari, E., and Perego, A. The REL-X vocabulary. OWL Vocabulary (accessed June 18, 2008) (2006), http://www.dicom.uninsubria.it/andrea.perego/vocs/relx.owl
Carminati, B., Ferrari, E., Perego, A.: Private Relationships in Social Networks. In: Proceedings of ICDE Workshops, pp. 163–171 (2007)
Davis, I., Vitiello Jr., E.: RELATIONSHIP: A vocabulary for describing relationships between people (accessed June 18, 2008) (2005), http://vocab.org/relationship/
Ferraiolo, D.F., Kuhn, D.R.: Role Based Access Control. In: 15th National Computer Security Conference, pp. 554–563 (1992)
Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas, R.K.: Flexible team-based access control using contexts. In: SACMAT 2001: Proceedings of the sixth ACM symposium on Access control models and technologies, pp. 21–27. ACM Press, New York (2001)
Jaeger, T., Prakash, A.: Requirements of role-based access control for collaborative systems. In: 1st ACM Workshop on Role-based access control. ACM Press, New York (1996)
Kern, A., Walhorn, C.: Rule support for role-based access control. In: 10th ACM symposium on Access Control Models and Technologies, pp. 130–138. ACM Press, New York (2005)
Kim, H., Ramakrishna, R.S., Sakurai, K.: A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. IEICE transactions on fundamentals of electronics, communications and computer sciences 88(1), 270–279 (2005)
Kolter, J., Schillinger, R., Pernul, G.: A Privacy-Enhanced Attribute-Based Access Control System. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 129–143. Springer, Heidelberg (2007)
Moyer, M.J., Ahamad, M.: Generalized Role-Based Access Control. In: ICDCS 2001: Proceedings of the The 21st International Conference on Distributed Computing Systems, p. 391. IEEE Computer Society, Los Alamitos (2001)
Periorellis, P., Parastatidis, S.: Task-Based Access Control for Virtual Organizations. Scientific Engineering of Distributed Java Applications, 38–47 (2005)
Russell, D., Gangemi Sr., G.T.: Computer Security Basics. O’Reilly and Associates, Inc., Sebastopol (1991)
Ryszard Kruk, S., Grzonkowski, S., Gzella, A., Woroniecki, T., Choi, H.C.: D-FOAF: Distributed Identity Management with Access Rights Delegation. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 140–154. Springer, Heidelberg (2006)
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
Shen, H., Dewan, P.: Access Control for Collaborative Environments. In: Computer-Supported Cooperative Work Conference, pp. 51–58. ACM Press, New York (1992)
Tolone, W., Ahn, G., Pai, T., Hong, S.: Access control in collaborative systems. ACM Computing Surveys 37, 29–41 (2005)
Zakas, N.C., McPeak, J., Fawcett, J.: Professional Ajax (Programmer to Programmer), 2nd edn. Wiley Publishing, Chichester (2007)
Zhang, G., Parashar, M.: Dynamic Context-aware Access Control for Grid Applications. In: GRID 2003: Proceedings of the Fourth International Workshop on Grid Computing, p. 101. IEEE Computer Society, Los Alamitos (2003)
Zhao, B.: Collaborative Access Control. In: Seminar on Network Security (NetSec) (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Nasirifard, P., Peristeras, V. (2008). Uncle-Share: Annotation-Based Access Control for Cooperative and Social Systems. In: Meersman, R., Tari, Z. (eds) On the Move to Meaningful Internet Systems: OTM 2008. OTM 2008. Lecture Notes in Computer Science, vol 5332. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-88873-4_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-88873-4_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-88872-7
Online ISBN: 978-3-540-88873-4
eBook Packages: Computer ScienceComputer Science (R0)