TY - GEN
T1 - Using attribute-based access control to enable attribute-based messaging
AU - Bobba, Rakesh
AU - Fatemieh, Omid
AU - Khan, Fariba
AU - Gunter, Carl A.
AU - Khurana, Himanshu
N1 - Copyright:
Copyright 2011 Elsevier B.V., All rights reserved.
PY - 2006
Y1 - 2006
N2 - Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted messaging can reduce unnecessary communications and enhance privacy, but faces challenges in access control. In this paper we explore an approach to ABM based on deriving access control information from the same attribute database exploited by the addressing scheme. We show how to address three key challenges. First, we demonstrate a manageable access control system based on attributes. Second we show how this can be used with existing messaging systems to provide a practical deployment strategy. Third, we show that such a system can be efficient enough to support ABM for mid-size enterprises. Our implementation can dispatch ABM messages approved by XACML review for an enterprise of at least 60,000 users with only seconds of latency.
AB - Attribute Based Messaging (ABM) enables message senders to dynamically create a list of recipients based on their attributes as inferred from an enterprise database. Such targeted messaging can reduce unnecessary communications and enhance privacy, but faces challenges in access control. In this paper we explore an approach to ABM based on deriving access control information from the same attribute database exploited by the addressing scheme. We show how to address three key challenges. First, we demonstrate a manageable access control system based on attributes. Second we show how this can be used with existing messaging systems to provide a practical deployment strategy. Third, we show that such a system can be efficient enough to support ABM for mid-size enterprises. Our implementation can dispatch ABM messages approved by XACML review for an enterprise of at least 60,000 users with only seconds of latency.
UR - https://www.scopus.com/pages/publications/39049153474
UR - https://www.scopus.com/pages/publications/39049153474#tab=citedBy
U2 - 10.1109/ACSAC.2006.53
DO - 10.1109/ACSAC.2006.53
M3 - Conference contribution
AN - SCOPUS:39049153474
SN - 0769527167
SN - 9780769527161
T3 - Proceedings - Annual Computer Security Applications Conference, ACSAC
SP - 403
EP - 413
BT - Proceedings - Annual Computer Security Applications Conference, ACSAC
T2 - 22nd Annual Computer Security Applications Conference, ACSAC 2006
Y2 - 11 December 2006 through 15 December 2006
ER -