Graph-based access control: Difference between revisions

Content deleted Content added
m History: clean up spacing around commas and other punctuation fixes, replaced: ,G → , G
Citation bot (talk | contribs)
Alter: url, title, template type. URLs might have been anonymized. Add: chapter-url, chapter, authors 1-1. Removed or converted URL. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_toolbar
 
(One intermediate revision by one other user not shown)
Line 2:
 
== History ==
The foundations of GBAC go back to a research project named CoCoSOrg (Configurable Cooperation System) [<ref name = "DISS">{{cite book |last1=Schaller |first1=Thomas |url=https://www.researchgate.net/publication/220690241 |title=Organisationsverwaltung in CSCW-Systemen - Dissertation |date=1998 |publisher=Bamberg University |___location=Bamberg}}</ref>] (in English language please see <ref name = "EOMAS">{{cite book |last1=Lawall, Schaller, Reichelt |url=https://www.researchgate.net/publication/283579217 |title=Enterprise Architecture: A Formalism for Modelling Organizational Structures in Information Systems |date=2014 |publisher=Enterprise and Organizatinal Modeling and Simulation: 10th International Workshop CAiSE2014 |___location=Thessaloniki}}</ref>) at Bamberg University. In CoCoSOrg an organization is represented as a semantic graph and a formal language is used to specify agents and their access rights in a workflow environment. Within the C-Org-Project at Hof University's Institute for Information Systems ([http://www.iisys.de/en/research/research-groups/information-management.html iisys]), the approach was extended by features like separation of duty, access control in virtual organizations <ref>{{cite journal|last1=Lawall, Schaller, Reichelt|title=Restricted Relations between Organizations for Cross-Organizational Processes|journal=IEEE 16th Conference on Business Informatics (CBI), Geneva|date=2014|pages=74–80}}</ref> and subject-oriented access control.<ref>{{cite book|last1=Lawall, Schaller, Reichelt|title=S-BPM in the Wild: Role and Rights Management|date=2015|publisher=Springer|___location=Berlin|isbn=978-3-319-17541-6|pages=171–186|edition=1}}</ref>
 
== Definition ==
Line 36:
GBAC was first implemented in the CoCoS Environment within the organizational server CoCoSOrg.<ref name=DISS />
In the C-Org-Project it was extended with more sophisticated features like separation of duty or access control in distributed environments.
There is also a cloud-based implementation<ref>{{citeCite book |last1=Lawall, Schaller,|first1=Alexander |last2=Reichelt |titlefirst2=Dominik |last3=Schaller |first3=Thomas |chapter=Resource Managementmanagement and Authorizationauthorization for Cloudcloud services Services|date=2015-04-23 |publishertitle=Proceedings of the 7th International Conference on Subject-Oriented Business Process Management |chapter-url=https://doi.org/10.1145/2723839.2723864 |series=S-BPM ONE '15 |___location=New York, ACMNY, USA |publisher=Association for Computing Machinery |pages=18:1–18:8 |doi=10.1145/2723839.2723864 |isbn=978-1-4503-3312-2}}</ref> on IBM's [[Bluemix]]<ref>[http://www.ibm.com/cloud-computing/bluemix/?cm_mmc=search-gsn-_-branded-Bluemix-general-_-ibm%20bluemix-_-ger-bm-mkt-oww Bluemix]</ref> platform.
 
In all implementations the server takes a query from a client system and resolves it to a set of agents. This set is sent back to the calling client as response. Clients can be file systems, database management systems, workflow management systems, physical security systems or even telephone servers.