Fine-grained Access Control using Email Social Network
نویسنده
چکیده
We introduce the idea of applying social network analysis to organizational access control. With current access control systems, users are typically assigned access to many more resources than they need and permissions are rarely updated. We propose to refine these access policies using the dynamic social network defined by intra-organizational emails. Email social networks within organizations reveal working relationships between employees. These revealed relationships can supplement standard access control groups, providing a way to enforce finer-grained access with minimal system administrator overhead.
منابع مشابه
Ontology-based access control for social network systems
As the information flowing around in social network systems is mainly related or can be attributed to their users, controlling access to such information by individual users becomes a crucial requirement. The intricate semantic relations among data objects, different users, and between data objects and users further add to the complexity of access control needs. In this paper, we propose an acc...
متن کاملDistributed query execution system for Transactional Database using Lookup Table
As data volumes are incrementing rigorously, it is essential to store such large amount of data distributed across many machines. In OLTP databases, the most common strategy for scaling database workload is to horizontally partition the database using hash or range partitioning. It works well in many simple applications such as an email application. Transactions that access few tuples do not ru...
متن کاملPopeye - Using Fine-grained Network Access Control to Support Mobile Users and Protect Intranet Hosts
We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are inflexible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same Intranet, in...
متن کاملInformation, Technology and Information Worker Productivity: Task Level Evidence
Past research has typically looked at fairly aggregate data on the relationship between IT and business value. In an effort to reveal the fine-grained relationships between IT use, information flows, and individual information-worker productivity, we study task level practices of information workers at a midsize executive recruiting firm. We analyze (1) detailed accounting data on revenues, com...
متن کاملThe Blind Enforcer: On Fine-Grained Access Control Enforcement on Untrusted Clouds
Migration of one’s computing infrastructure to the cloud is gathering momentum with the emergence of relatively mature cloud computing technologies. As data and computation are being outsourced, concerns over data security (such as confidentiality, privacy and integrity) remain one of the greatest hurdles to overcome. In the meanwhile, the increasing need for sharing data between or within clou...
متن کامل