Protecting Sensitive Attributes in Attribute Based Access Control
Identifieur interne : 001511 ( Main/Exploration ); précédent : 001510; suivant : 001512Protecting Sensitive Attributes in Attribute Based Access Control
Auteurs : Guoping Zhang [République populaire de Chine] ; Jing Liu [République populaire de Chine] ; Jianbo Liu [République populaire de Chine]Source :
- Lecture Notes in Computer Science [ 0302-9743 ]
Abstract
Abstract: Attribute Based Access Control (ABAC) has gradually become a hot research topic in distributed systems. While frequent disclosure of subject attributes, resource attributes or environment attributes may lead to leaks of sensitive information. This article mainly focuses on protecting privacy of resource requester in the process of ABAC, and presents a trust based sensitive attributes protection mechanism which can disclose attributes through comparing resource requester’s attribute sensitivity with resource provider’s trust level. After experiments comparison with Beth model, we get a conclusion that this mechanism has higher accuracy, without violating resource requester’s privacy.
Url:
DOI: 10.1007/978-3-642-37804-1_30
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000049
- to stream Istex, to step Curation: 000049
- to stream Istex, to step Checkpoint: 000137
- to stream Main, to step Merge: 001523
- to stream Main, to step Curation: 001511
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Protecting Sensitive Attributes in Attribute Based Access Control</title>
<author><name sortKey="Zhang, Guoping" sort="Zhang, Guoping" uniqKey="Zhang G" first="Guoping" last="Zhang">Guoping Zhang</name>
</author>
<author><name sortKey="Liu, Jing" sort="Liu, Jing" uniqKey="Liu J" first="Jing" last="Liu">Jing Liu</name>
</author>
<author><name sortKey="Liu, Jianbo" sort="Liu, Jianbo" uniqKey="Liu J" first="Jianbo" last="Liu">Jianbo Liu</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:026EEDD38AEDCA4E21BF543874BA020B8852F091</idno>
<date when="2013" year="2013">2013</date>
<idno type="doi">10.1007/978-3-642-37804-1_30</idno>
<idno type="url">https://api.istex.fr/ark:/67375/HCB-WT70G1L5-5/fulltext.pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000049</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000049</idno>
<idno type="wicri:Area/Istex/Curation">000049</idno>
<idno type="wicri:Area/Istex/Checkpoint">000137</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Checkpoint">000137</idno>
<idno type="wicri:doubleKey">0302-9743:2013:Zhang G:protecting:sensitive:attributes</idno>
<idno type="wicri:Area/Main/Merge">001523</idno>
<idno type="wicri:Area/Main/Curation">001511</idno>
<idno type="wicri:Area/Main/Exploration">001511</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Protecting Sensitive Attributes in Attribute Based Access Control</title>
<author><name sortKey="Zhang, Guoping" sort="Zhang, Guoping" uniqKey="Zhang G" first="Guoping" last="Zhang">Guoping Zhang</name>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer & Communication Engineering, China University of Petroleum, Qing Dao</wicri:regionArea>
<wicri:noRegion>Qing Dao</wicri:noRegion>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">République populaire de Chine</country>
</affiliation>
</author>
<author><name sortKey="Liu, Jing" sort="Liu, Jing" uniqKey="Liu J" first="Jing" last="Liu">Jing Liu</name>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer & Communication Engineering, China University of Petroleum, Qing Dao</wicri:regionArea>
<wicri:noRegion>Qing Dao</wicri:noRegion>
</affiliation>
<affiliation></affiliation>
</author>
<author><name sortKey="Liu, Jianbo" sort="Liu, Jianbo" uniqKey="Liu J" first="Jianbo" last="Liu">Jianbo Liu</name>
<affiliation wicri:level="1"><country xml:lang="fr">République populaire de Chine</country>
<wicri:regionArea>School of Computer & Communication Engineering, China University of Petroleum, Qing Dao</wicri:regionArea>
<wicri:noRegion>Qing Dao</wicri:noRegion>
</affiliation>
<affiliation></affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s" type="main" xml:lang="en">Lecture Notes in Computer Science</title>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Attribute Based Access Control (ABAC) has gradually become a hot research topic in distributed systems. While frequent disclosure of subject attributes, resource attributes or environment attributes may lead to leaks of sensitive information. This article mainly focuses on protecting privacy of resource requester in the process of ABAC, and presents a trust based sensitive attributes protection mechanism which can disclose attributes through comparing resource requester’s attribute sensitivity with resource provider’s trust level. After experiments comparison with Beth model, we get a conclusion that this mechanism has higher accuracy, without violating resource requester’s privacy.</div>
</front>
</TEI>
<affiliations><list><country><li>République populaire de Chine</li>
</country>
</list>
<tree><country name="République populaire de Chine"><noRegion><name sortKey="Zhang, Guoping" sort="Zhang, Guoping" uniqKey="Zhang G" first="Guoping" last="Zhang">Guoping Zhang</name>
</noRegion>
<name sortKey="Liu, Jianbo" sort="Liu, Jianbo" uniqKey="Liu J" first="Jianbo" last="Liu">Jianbo Liu</name>
<name sortKey="Liu, Jing" sort="Liu, Jing" uniqKey="Liu J" first="Jing" last="Liu">Jing Liu</name>
<name sortKey="Zhang, Guoping" sort="Zhang, Guoping" uniqKey="Zhang G" first="Guoping" last="Zhang">Guoping Zhang</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Lorraine/explor/InforLorV4/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001511 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001511 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Lorraine |area= InforLorV4 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:026EEDD38AEDCA4E21BF543874BA020B8852F091 |texte= Protecting Sensitive Attributes in Attribute Based Access Control }}
This area was generated with Dilib version V0.6.33. |