Multi-party access control: Requirements, state of the art and open challenges

Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Abstract

Multi-party access control is gaining attention and prominence within the community, as access control models and systems are faced with complex, jointly-owned and jointly-managed content. Traditional single-user approaches lack the richness and flexibility to accommodate these scenarios, resulting in undesired disclosure of sensitive data and resources. Moving forward fundamental work in this area is critical. In particular, as personal data amasses and algorithms for data mining improve, personally identifiable information is more readily inferred and the practical implications of privacy decisions are relatively opaque. This is true even at the individual level, but the parallel problem for jointly managed content involves the cross product of these complex outcomes. In this presentation, we discuss fundamental requirements of successful multi-party access control mechanisms and contextualize these concepts with respect to the state of the art. Based on this analysis, we identify open challenges and draw a roadmap for future work.

Original languageEnglish
Title of host publicationSACMAT 2018 - Proceedings of the 23rd ACM Symposium on Access Control Models and Technologies
PublisherAssociation for Computing Machinery, Inc
Number of pages1
ISBN (Electronic)9781450356664
DOIs
Publication statusPublished - 7 Jun 2018
Event23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018) - Indianapolis, United States
Duration: 13 Jun 201815 Jun 2018
Conference number: 23
http://www.sacmat.org

Conference

Conference23rd ACM Symposium on Access Control Models and Technologies (SACMAT 2018)
Abbreviated titleSACMAT 2018
Country/TerritoryUnited States
CityIndianapolis
Period13/06/1815/06/18
Internet address

Keywords

  • Collaborative access control
  • Data governance
  • Literature study

Fingerprint

Dive into the research topics of 'Multi-party access control: Requirements, state of the art and open challenges'. Together they form a unique fingerprint.

Cite this