By Topic

Access control by using object properties and categorized methods

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Matsumoto, K. ; Kyushu Inst. of Technol., Iizuka, Japan ; Hashimoto, A. ; Yoshida, T.

We propose an access control model that is suitable for a distributed object oriented environment. Our model has two features: authentication with object properties and method categorization by a security level. The object property is meta information of a client, and the client is vested with it in advance. To use the object properties, a server can identify a huge number of clients in the environment by groups that is categorized with the object properties of the clients. And also, to use a combination of multiple object properties in authentication, an administrator of the server can determine the flexible range of target clients. The security level shows how much impact the method affects server's data. If a designer of the server categorizes the server's methods with a security level, an administrator of the server can set an authorization rule to each category instead of each server's method. The categories constitute a tree structure, since a parent category includes child categories. As a result of this, the administrator can set an authorization rule easier than authorization without categorization by the security level. Furthermore, we implemented above the access control model and we evaluated their efficiency.

Published in:

Advanced Information Networking and Applications, 2004. AINA 2004. 18th International Conference on  (Volume:2 )

Date of Conference:

29-31 March 2004