Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 232708, 13 pages
http://dx.doi.org/10.1155/2014/232708
Research Article

An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application

1State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, China
2State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
3Institute of Computer Science & Technology, Peking University, Beijing 100080, China
4Liverpool John Moores University, Liverpool L3 3AF, UK

Received 8 March 2014; Revised 10 June 2014; Accepted 11 June 2014; Published 17 July 2014

Academic Editor: Fei Yu

Copyright © 2014 Mang Su et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, “A generalized temporal role-based access control model,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 4–23, 2005. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Indrakshi, K. Mahendra, and Y. Lijun, “LRBAC: a location-aware role-based access control model,” in Proceedings of the 2nd International Conference on Information Systems Security (ICISS '06), pp. 147–161, Springer.
  3. H.-C. Chen, S.-J. Wang, J.-H. Wen, and C. Chen, “Temporal and location-based RBAC model,” in Proceedings of the 5th International Joint Conference on INC, IMS and IDC, pp. 2111–2116, IEEE Computer Society, Seoul, Korea, August 2009. View at Publisher · View at Google Scholar · View at Scopus
  4. Y.-J. Zhang and D.-G. Feng, “A role-based access control model based on space, time and scale,” Journal of Computer Research and Development, vol. 47, no. 7, pp. 1252–1260, 2010. View at Google Scholar · View at Scopus
  5. B. Shafiq, J. B. D. Joshi, E. Bertino, and A. Ghafoor, “Secure interoperation in a multidomain environment employing RBAC policies,” IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 11, pp. 1557–1577, 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Park and R. Sandhu, “Towards usage control models: beyond traditional access control,” in Proceedings of 7th ACM Symposium on Access Control Models and Technologies (SACMAT '02), pp. 57–64, Monterey, Calif, USA, June 2002. View at Publisher · View at Google Scholar · View at Scopus
  7. X. Jin, R. Krishnan, and R. Sandhu, “A unified attribute-based access control model covering DAC, MAC and RBAC,” Lecture Notes in Computer Science, vol. 7371, pp. 41–55, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. S. Chakraborty and I. Ray, “TrustBAC—integrating trust relationships into the RBAC model for access control in open systems,” in Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT '06), pp. 49–58, June 2006. View at Scopus
  9. F. H. Li, W. Wang, J. F. Ma, and X. Y. Liang, “Action-based access control model and administration of actions,” Acta Electronica Sinica, vol. 36, no. 10, pp. 1881–1890, 2008. View at Google Scholar · View at Scopus
  10. L. Li, Y.Z. He, and D.-G. Feng, “A fine-grained mandatory access control model for xml documents,” Journal of Software, vol. 15, no. 10, pp. 1528–1537, 2004. View at Google Scholar · View at Scopus
  11. Q. Li, X. Zhang, M. Xu, and J. Wu, “Towards secure dynamic collaborations with group-based RBAC model,” Computers and Security, vol. 28, no. 5, pp. 260–275, 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. D. C. Li, C. Liu, and B. S. Liu, “H-RBAC: a hierarchical access control model for SaaS systems,” International Journal of Modern Education and Computer Science, vol. 5, pp. 47–53, 2011. View at Google Scholar
  13. R. Yang, C. Lin, Y. Jiang, and X. Chu, “Trust based access control in infrastructure-centric environment,” in Proceedings of the IEEE International Conference on Communications (ICC '11), IEEE, Kyoto, Japan, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. N. Boustia and A. Mokhtari, “A dynamic access control model,” Applied Intelligence, vol. 36, no. 1, pp. 190–207, 2012. View at Publisher · View at Google Scholar · View at Scopus