199
Views
8
CrossRef citations to date
0
Altmetric
Original Articles

Context-Sensitive Access Control Model for Government Services

, , &
Pages 184-213 | Published online: 27 Apr 2012

REFERENCES

  • Abowd , G. D. , Dey , A. K. , Brown , P. J. , Davies , N. , Smith , M. and Steggles , P. “Towards a better understanding of context and context-awareness.” . Paper presented at the 1st International Symposium on Handheld and Ubiquitous Computing . Karlsruhe , Germany. September 27–29 .
  • Abowd , G. D. , Mynatt , E. D. and Rodden , T. 2002 . The human experience . IEEE Pervasive Computing , 1 ( 1 ) : 48 – 57 .
  • Bao , Y. , Song , J. , Wang , D. , Shen , D. and Yu , G. “A role and context based access control model with UML.” . Paper presented at the 9th International Conference for Young Computer Scientists . Zhang Jia Jie , Hunan , China. November 18–21 .
  • Bertino , E. , Bonatti , P. A. and Ferrari , E. 2001 . TRBAC: A temporal role-based access control model . ACM Transactions on Information and System Security , 4 ( 3 ) : 191 – 233 .
  • Bertino , E. , Catania , B. , Damiani , M. L. and Perlasca , P. “GEO-RBAC: A spatially aware RBAC.” . Paper presented at the 10th ACM Symposium on Access Control Models and Technologies (SACMAT) . Stockholm , Sweden. June 1–3 .
  • Bhatti , R. , Bertino , E. , Ghafoor , A. and Joshi , J. B. D. 2004 . XML-based specification for Web services document security . Computer , 37 ( 4 ) : 41 – 49 .
  • Botha , R. A. and Eloff , J. H. P. 2001 . Access control in document-centric workflow systems—an agent-based approach . Computers & Security , 20 ( 6 ) : 525 – 532 .
  • Covington , M. J. , Long , W. , Srinivasan , S. , Dev , A. K. , Ahamad , M. and Abowd , G. D. “Securing context-aware applications using environment roles.” . Paper presented at the 6th ACM Symposium on Access Control Models and Technologies (SACMAT) . Chantilly , Virginia , USA. May 3–4 .
  • Damiani , M. L. , Bertino , E. , Catania , B. and Perlasca , P. 2007 . GEO-RBAC: A spatially aware RBAC . ACM Transactions on Information and System Security , 10 ( 1 ) : 1 – 42 .
  • Davenport , T. H. and Short , J. E. 1991 . The new industrial engineering: information technology and business process redesign . Sloan Management Review , 31 ( 5 ) : 11 – 27 .
  • de Freitas Bulcao Neto , R. and da Graca Campos Pimentel , M. “Toward a domain-independent semantic model for context-aware computing.” . Paper presented at the 3rd Latin American Web Congress (LA-WEB) . Buenos Aires , Argentina. October 31–November 2 .
  • Dey , A. K. 2001 . Understanding and using context . Personal Ubiquitous Computing , 5 ( 1 ) : 4 – 7 .
  • Ferraiolo , D. F. , Sandhu , R. , Gavrila , S. , Kuhn , D. R. and Chandramouli , R. 2001 . Proposed NIST standard for role-based access control . ACM Transactions on Information and System Security (TISSEC) , 4 ( 3 ) : 224 – 274 .
  • Filho , J. B. and Martin , H. “Using context quality indicators for improving context-based access control in pervasive environments.” . Paper presented at the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing . Shangai , China. December 17–20 .
  • Gao , L. , Zhang , L. and Xu , L. “Access control scheme for workflow.” . Paper presented at the International Conference on Computer Engineering and Technology . Singapore. January 22–24 .
  • Georgiadis , G. K. , Mavridis , I. , Pangalos , G. and Thomas , R. K. “Flexible team-based access control using contexts.” . Paper presented at the 6th ACM Symposium on Access Control Models and Technologies (SACMAT) . Chantilly , Virginia , USA. May 3–4 .
  • Han , W. , Zhang , J. and Yao , X. “Context-sensitive access control model and implementation.” . Paper presented at the 5th International Conference on Computer and Information Technology (CIT) . Shanghai , China. September 21–23 .
  • Hollingsworth , D. 1995 . Workflow management coalition: The workflow reference model , Technical Report, Workflow Management Coalition
  • International Organization for Standardization (ISO) . 2001 . ISO IEC 82045-1: Document management—Part 1: Principles and methods. Geneva, Switzerland .
  • Irwin , K. , Yu , T. and Winsborough , W. H. “Enforcing security properties in task-based systems.” . Paper presented at the 13th ACM Symposium on Access Control Models and Technologies (SACMAT) . Estes Park , CO , USA. June 11–13 .
  • Joshi , J. B. D. , Ghafoor , A. , Aref , W. G. and Spafford , E. H. 2001 . Digital government security infrastructure design challenges . IEEE Computer , 34 ( 2 ) : 66 – 72 .
  • Joshi , J. B. D. , Ghafoor , A. , Aref , W. G. and Spafford , E. H. 2002 . “ Security and privacy challenges of a digital government ” . In Advances in Digital Government—Technology, Human Factors and Policy , Edited by: McIver , W. J. and Elmagarmid , A. K. 42 – 56 . Boston : Kluwer Academic .
  • Latif , U. , Joshi , J. B. D. , Bertino , E. and Ghafoor , A. 2005 . A generalized temporal role-based access control model . IEEE Transactions on Knowledge and Data Engineering , 17 ( 1 ) : 4 – 23 .
  • OASIS. 2011. “eXtensible Access Control Markup Language (XACML).” http://www.oasis-open.org/committees/xacml/ (http://www.oasis-open.org/committees/xacml/) (Accessed: 28 April ).
  • Oh , S. and Park , S. 2003 . Task-role-based access control model . Information Systems , 28 ( 6 ) : 533 – 562 .
  • Organization for Economic Co-operation and Development (OECD) . 1980 . OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data , Paris, France.
  • Partow-Navid , P. and Slusky , L. 2007 . “ IT security policy in public organizations ” . In Encyclopedia of Digital Government , Edited by: Anttiroiko , A.-V. and Malkaia , M. 1135 – 1141 . Hershey , PA : Idea Group Reference .
  • Schilit , B. , Adams , N. and Want , R. “Context-aware computing applications.” . Paper presented at the 1st IEEE Workshop on Mobile Computing Systems and Applications . Santa Cruz , USA. December 8–9 . California
  • Shafiq , B. , Samuel , A. and Ghafoor , H. “A GTRBAC based system for dynamic workflow composition and management.” . Paper presented at the 8th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC) . Seattle , WA , USA. May 18–20 .
  • Simon , R. T. and Zurko , M. E. “Separation of duty in role-based environments.” . Paper presented at the 10th IEEE Workshop on Computer Security Foundations . Rockport , Massachusetts , USA. June 10–12 .
  • Sladić , G. , Milosavljević , B. and Konjović , Z. “Extensible access control model for XML document collections.” . Paper presented at the 2nd International Conference on Security and Cryptography . Barcelona , Spain. July 28–31 .
  • Sladić , G. , Milosavljević , B. , Konjović , Z. and Vidaković , M. 2011 . Access control framework for XML document collections . Computer Science and Information System (ComSIS) , 8 ( 3 ) : 591 – 609 .
  • Sladić , G. , Milosavljević , B. , Surla , D. and Konjović , Z. 2012 . Flexible access control framework for MARC records . The Electronic Library , 30 ( 5 ) in press
  • Strembeck , M.K. and Neumann , G. 2004 . An integrated approach to engineer and enforce context constraints in RBAC environments . ACM Transactions on Information and System Security , 7 ( 3 ) : 392 – 427 .
  • Thomas , R. K. and Sandhu , R. S. “Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management.” . Paper presented at the IFIP TC11 WG11.3 11th International Conference on Database Security . Lake Tahoe , California , USA. August 10–13 .
  • Tripathi , A. R.. , Kulkarni , D. and Ahmed , T. 2005 . A specification model for context-based collaborative applications . Pervasive Mobile Computing , 1 ( 1 ) : 21 – 42 .
  • Truong , K. N. , Abowd , G. D. and Brotherton , J. A. Paper presented at the 3rd International Conference Ubiquitous Computing . Atlanta , Georgia , USA. “Who, what, when, where, how: Design issues of capture and access applications.” , September 30–October 2 .
  • Wainer , J. , Barthelmess , P. and Kumarl , A. 2003 . W-RBAC—A workflow security model incorporating controlled overriding of constraints . International Journal of Cooperative Information Systems , 12 ( 4 ) : 455 – 485 .
  • Xu , W. , Wei , J. , Liu , Y. and Li , J. “SOWAC—A service-oriented workflow access control model.” . Paper presented at the 28th Annual International Computer Software and Applications Conference . Hong Kong , China. September 28–30 .
  • Yao , L. , Kong , X. and Xu , Z. “A task-role based access control model with multi-constraints.” . Paper presented at the 4th International Conference on Networked Computing and Advanced Information Management . Gyeongju , Korea. September 2–4 .
  • Zhang , L. , Luo , L. , Zhang , L. , Geng , T. and Yue , Z. “Task-role-based access control in application on MIS.” . Paper presented at the IEEE Asia-Pacific Conference on Services Computing (APSCC) . Guangzhou , China. December 12–15 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.