An Integrated Access Control Service Enabler for Cloud Applications

Author(s):  
Tran Quang Thanh ◽  
Stefan Covaci ◽  
Benjamin Ertl ◽  
Paolo Zampognano
Author(s):  
Yumna Ghazi ◽  
Rahat Masood ◽  
Muhammad Awais Shibli ◽  
Sara Khurshid

The Cloud technology takes Service Oriented Architecture to the next level, where applications and infrastructure can be outsourced over the internet. It affords flexibility to businesses in terms of the on-demand scalability of services as well as the corresponding payment model. However, these advantages do not make up for the inherent security weaknesses in the Cloud. Among various concerns, Cloud providers struggle to provide adequate authorization mechanisms that would protect customer's critical data. In this regard, Usage Control (UCON) is considered to be the next generation model for digital rights management for all the service models of Cloud. Limited literature work exists on the UCON model; however, new tracks need to be laid out to make this model comply with international standards and policy languages. This chapter provides standardized UCON policy specifications, which will help in the effective development of access control for the Cloud environment.


2011 ◽  
Vol 2 (2) ◽  
pp. 1-24 ◽  
Author(s):  
Kim Wuyts ◽  
Riccardo Scandariato ◽  
Griet Verhenneman ◽  
Wouter Joosen

Many initiatives exist that integrate e-health systems on a large scale. One of the main technical challenges is access control, although several frameworks and solutions, like XACML, are becoming standard practice. Data is no longer shared within one affinity domain but becomes ubiquitous, which results in a loss of control. As patients will be less willing to participate without additional control strategies, patient consents are introduced that allow the patients to determine precise access rules on their medical data. This paper explores the consequences of integrating consent in e-health access control. First, consent requirements are examined, after which an architecture is proposed which incorporates patient consent in the access control service of an e-health system. To validate the proposed concepts, a proof-of-concept implementation is built and evaluated.


2006 ◽  
Vol 7 (6) ◽  
pp. 1-1 ◽  
Author(s):  
T. Verhanneman ◽  
F. Piessens ◽  
B. De Win ◽  
E. Truyen ◽  
W. Joosen

Sign in / Sign up

Export Citation Format

Share Document