CONTEXT-AWARE SHARING CONTROL USING HYBRID ROLES IN INTER-ENTERPRISE COLLABORATION

Ahmad Kamran Malik, Schahram Dustdar

Abstract

In enterprise-based collaborations, humans working in dynamic overlapping teams controlled by their respective enterprises, share personal context and team related context for accomplishment of their activities. Privacy of personal context becomes vital in this scenario. Personal context contains information that user may not want to share, for example, her current location and current activity. We propose a role-based dynamic sharing control model which is owner centric and extends role-based access control model. We provide privacy of owner’s personal context by separating it from team related context through the use of owner defined roles. Owner has full control of her personal data and is able to dynamically change her own access rules facing any new situation. We describe a role-based dynamic sharing control architecture which makes use of enterprisedefined roles as well as owner-defined roles for separating user context from team context. We evaluate our approach by providing a real world scenario, its running example, and implementation as sharing control messenger using Web services in Java.

References

  1. Ahn, G.-J., Zhang, L., Shin, D., and Chu, B. (2003). Authorization management for role-based collaboration. In IEEE International Conference on Systems, Man and Cybernetics, 2003., volume 5, pages 4128 - 4134.
  2. Baldauf, M., Dustdar, S., and Rosenberg, F. (2007). A survey on context-aware systems. IJAHUC, 2(4):263- 277.
  3. Coetzee, M. and Eloff, J. H. P. (2007). A trust and context aware access control model for web services conversations. In TrustBus 2007, Regensburg, Germany, volume 4657 of Lecture Notes in Computer Science, pages 115-124. Springer.
  4. Covington, M. J., Long, W., Srinivasan, S., Dev, A. K., Ahamad, M., and Abowd, G. D. (2001). Securing context-aware applications using environment roles. In SACMAT 7801, pages 10-20, New York, NY, USA. ACM.
  5. Dustdar, S. (2004). Caramba - A process-aware collaboration system supporting ad hoc and collaborative processes in virtual teams. Journal of Distributed and Parallel Databases, 15(1):45-66.
  6. Groba, C., Grob, S., and Springer, T. (2007). Contextdependent access control for contextual information. In ARES 7807, pages 155-161, Washington, DC, USA. IEEE Computer Society.
  7. Kapsalis, V., Hadellis, L., Karelis, D., and Koubias, S. A. (2006). A dynamic context-aware access control architecture for e-services. Computers & Security, 25(7):507-521.
  8. Malik, A. K., Truong, H. L., and Dustdar, S. (2009). DySCon: Dynamic sharing control for distributed team collaboration in networked enterprises. In IEEE Conference on Commerce and Enterprise Computing, CEC 2009, Vienna, Austria, pages 279-284.
  9. Park, S.-H., Han, Y.-J., and Chung, T.-M. (2006). Contextrole based access control for context-aware application. In HPCC 2006, Munich, Germany, volume 4208 of Lecture Notes in Computer Science, pages 572- 580. Springer.
  10. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. (1996). Role-based access control models. IEEE Computer, 29(2):38-47.
  11. Shen, H. and Dewan, P. (1992). Access control for collaborative environments. In Proceedings of ACM CSCW'92 Conference on Computer-Supported Cooperative Work, pages 51-58.
  12. Shen, H. and Hong, F. (2005). A context-aware rolebased access control model for web services. In IEEE International Conference on e-Business Engineering (ICEBE 2005), Beijing, China, pages 220-223.
  13. Thomas, R. (1997). Team-based access control (TMAC). In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), pages 13-22, New York.
  14. Tolone, W., Ahn, G.-J., Pai, T., and Hong, S.-P. (2005). Access control in collaborative systems. ACM Computing Surveys, 37(1):29-41.
  15. Truong, H. L. and Dustdar, S. (2009). A survey on contextaware web service systems. IJWIS, 5(1):5-31.
Download


Paper Citation


in Harvard Style

Kamran Malik A. and Dustdar S. (2010). CONTEXT-AWARE SHARING CONTROL USING HYBRID ROLES IN INTER-ENTERPRISE COLLABORATION . In Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-8425-22-5, pages 42-48. DOI: 10.5220/0003013600420048


in Bibtex Style

@conference{icsoft10,
author={Ahmad Kamran Malik and Schahram Dustdar},
title={CONTEXT-AWARE SHARING CONTROL USING HYBRID ROLES IN INTER-ENTERPRISE COLLABORATION},
booktitle={Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2010},
pages={42-48},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003013600420048},
isbn={978-989-8425-22-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - CONTEXT-AWARE SHARING CONTROL USING HYBRID ROLES IN INTER-ENTERPRISE COLLABORATION
SN - 978-989-8425-22-5
AU - Kamran Malik A.
AU - Dustdar S.
PY - 2010
SP - 42
EP - 48
DO - 10.5220/0003013600420048