Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/580940.844955guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Purpose-Oriented Access Control Model

Published: 21 January 1998 Publication History

Abstract

Abstract: In distributed applications, multiple objects cooperate to achieve some objectives. Each object is manipulated through an operation supported by the object and then the operation may further invoke operations of other objects, i.e. nested operations. Purpose-oriented access rules indicate what operation in each object can invoke operations of other objects. Information flow among the objects occurs if the requests and responses of the operations carry data. Only the purpose-oriented access rules which imply legal information flow are allowed. In this paper, we discuss how to specify the access rules so that the information flow occurring in the nested invocation of the operations is legal.

Cited By

View all
  • (2014)A Framework for Expressing and Enforcing Purpose-Based Privacy PoliciesACM Transactions on Information and System Security10.1145/262968917:1(1-31)Online publication date: 15-Aug-2014
  • (2011)Towards defining semantic foundations for purpose-based privacy policiesProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943541(213-224)Online publication date: 21-Feb-2011

Index Terms

  1. A Purpose-Oriented Access Control Model
    Index terms have been assigned to the content through auto-classification.

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ICOIN '98: Proceedings of the 13th International Conference on Information Networking
    January 1998
    ISBN:0818672250

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 21 January 1998

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2014)A Framework for Expressing and Enforcing Purpose-Based Privacy PoliciesACM Transactions on Information and System Security10.1145/262968917:1(1-31)Online publication date: 15-Aug-2014
    • (2011)Towards defining semantic foundations for purpose-based privacy policiesProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943541(213-224)Online publication date: 21-Feb-2011

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media