DocumentCode :
1844653
Title :
Integrating social identity theory in access control
Author :
Chowdhury, Mohammad M R ; Noll, Josef
Author_Institution :
UNIK-Univ. Grad. Center, Kjeller, Norway
fYear :
2009
fDate :
15-17 Dec. 2009
Firstpage :
719
Lastpage :
724
Abstract :
Real world identities are multifaceted. Besides the traditional form of identities, a person can gain access through the membership of a social group or relationship to other known individuals. Social identity theories support relationship as being identity of individuals. This paper goes beyond the boundaries of the technical research, identifies the relevant findings of the social science research and incorporates them in an access control model to provide constrained access to the contents and services. In this regard semantic technologies are exploited to represent the access control model. The paper provides a thorough evaluation of the proposed model comparing with the prominent access control models.
Keywords :
authorisation; access control model; semantic technologies; social identity theory; social science research; Access control; Access control; identity; ontology; policy; rule; semantic technologies;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (MICC), 2009 IEEE 9th Malaysia International Conference on
Conference_Location :
Kuala Lumpur
Print_ISBN :
978-1-4244-5531-7
Type :
conf
DOI :
10.1109/MICC.2009.5431404
Filename :
5431404
Link To Document :
بازگشت