Fine-grained Access Control using Email Social Network

نویسنده

  • Anil Somayaji
چکیده

We introduce the idea of applying social network analysis to organizational access control. With current access control systems, users are typically assigned access to many more resources than they need and permissions are rarely updated. We propose to refine these access policies using the dynamic social network defined by intra-organizational emails. Email social networks within organizations reveal working relationships between employees. These revealed relationships can supplement standard access control groups, providing a way to enforce finer-grained access with minimal system administrator overhead.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ontology-based access control for social network systems

As the information flowing around in social network systems is mainly related or can be attributed to their users, controlling access to such information by individual users becomes a crucial requirement. The intricate semantic relations among data objects, different users, and between data objects and users further add to the complexity of access control needs. In this paper, we propose an acc...

متن کامل

Distributed query execution system for Transactional Database using Lookup Table

As data volumes are incrementing rigorously, it is essential to store such large amount of data distributed across many machines. In OLTP databases, the most common strategy for scaling database workload is to horizontally partition the database using hash or range partitioning. It works well in many simple applications such as an email application. Transactions that access few tuples do not ru...

متن کامل

Popeye - Using Fine-grained Network Access Control to Support Mobile Users and Protect Intranet Hosts

We are facing a trend towards ubiquitous connectivity where users demand access at anytime, anywhere. This has lead to the deployment of public network ports and wireless networks. Current solutions to network access control are inflexible and only provide all-or-nothing access. It is also increasing important to protect Intranet hosts from other mobile and static hosts on the same Intranet, in...

متن کامل

Information, Technology and Information Worker Productivity: Task Level Evidence

Past research has typically looked at fairly aggregate data on the relationship between IT and business value. In an effort to reveal the fine-grained relationships between IT use, information flows, and individual information-worker productivity, we study task level practices of information workers at a midsize executive recruiting firm. We analyze (1) detailed accounting data on revenues, com...

متن کامل

The Blind Enforcer: On Fine-Grained Access Control Enforcement on Untrusted Clouds

Migration of one’s computing infrastructure to the cloud is gathering momentum with the emergence of relatively mature cloud computing technologies. As data and computation are being outsourced, concerns over data security (such as confidentiality, privacy and integrity) remain one of the greatest hurdles to overcome. In the meanwhile, the increasing need for sharing data between or within clou...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013