Policy extension for data access control

Show simple item record

dc.contributor.author Arunkumar, S.
dc.contributor.author Raghavendra, A.
dc.contributor.author Weerasinghe, D.
dc.contributor.author Patel, Dhiren R.
dc.contributor.author Rajarajan, Muttukrishnan
dc.contributor.other Presented at the 2010 6th IEEE Workshop on Secure Network Protocols (NPSec)
dc.date.accessioned 2014-04-22T16:09:55Z
dc.date.available 2014-04-22T16:09:55Z
dc.date.issued 2010
dc.identifier.citation Patel, Dhiren R. et. al, “Policy extension for data access control”, presented at the 2010 6th IEEE Workshop on Secure Network Protocols (NPSec), DOI: 10.1109/NPSEC.2010.5634447, pp. 55–60, 2010. en_US
dc.identifier.uri http://dx.doi.org/10.1109/NPSEC.2010.5634447
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/1036
dc.description.abstract In this paper, we propose a security framework, looking at different policies for data access control in the mobile environments. We have started with extending the Platform for Privacy Preferences (P3P) policy for controlling the data access. The aim is to modify the P3P policy and to use it in the security capsule of a mobile handset. The service provider can publish the P3P policy in the WebServices and request the mobile client for the user preferences. With the introduction of P3P policy into the mobile device the access to the data is controlled including user preferences and identity mapping. Service provider data will always be encrypted and successful decryption will be a big challenge. Further we looked at the extensible Access Control Markup Language (XACML) policy as it is the way forward for the mobile environment and XACML is the latest policy that is operational smoothly in the mobile environment. Though XACML is a rich framework, it intentionally does not address how to preserve the privacy of authorization entities. For this, we require well-defined trust relationships between the participants, but first time business partners may not have pre-existing relationships. Therefore, a mechanism for gradual building of trust is needed and the security capsule that is presented in this work will provide this. This paper identifies the steps involved in performing transactions with the service provider through the retrieval of policy information and hence proposes an architecture that verifies the data access control. en_US
dc.description.statementofresponsibility by Dhiren R. Patel et al.,
dc.format.extent pp. 55–60
dc.language.iso en en_US
dc.publisher Institute of Electrical and Electronics Engineers (IEEE) en_US
dc.subject Access control en_US
dc.subject Cryptography en_US
dc.subject Mobile communication en_US
dc.subject Mobile handsets en_US
dc.subject Privacy en_US
dc.subject Real time systems en_US
dc.title Policy extension for data access control en_US
dc.type Conference Paper en_US


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account