Access Control by Action Control

Research output: Chapter in Book/Report/Conference proceedingConference paper

2 Citations (Scopus)

Abstract

We address the problem of defining access control policies that may be used in the evaluation of requests made by client actors, in the course of e-trading, to perform actions on the resources maintained by an e-collective. An e-collective is a group of agents that may act individually or in conjunction with other agents to satisfy a client's request to act. Our principal contribution to this key problem is to define formally an access control model in terms of which policies may be specified for helping to ensure that only legitimate forms of client actions are performed in the course of engaging in e-trading. We call this model the action control model. In action control, the notion of intentional, empowered, authorized actions, that may be performed individualistically or jointly with other agents, and in a manner that is consistent with a group ethos, is the basis for specifying a set of permissives. A permissive is a generalization of the notion of a permission (as the latter term is usually interpreted in access control). In addition to the formal definition of the action control model, we give examples of action control policy specifications and we describe a candidate implementation and performance measures.
Original languageEnglish
Title of host publicationUnknown
Place of PublicationNEW YORK
PublisherASSOC COMPUTING MACHINERY
Pages143 - 152
Number of pages10
ISBN (Print)978-1-60558-129-3
Publication statusPublished - 2008
Event13th ACM Symposium on Access Control Models and Technologies - Estes Pk, CO
Duration: 11 Jun 200813 Jun 2008

Publication series

NameSACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES

Conference

Conference13th ACM Symposium on Access Control Models and Technologies
CityEstes Pk, CO
Period11/06/200813/06/2008

Fingerprint

Dive into the research topics of 'Access Control by Action Control'. Together they form a unique fingerprint.

Cite this