Attribute-Based Messaging and Security

Messaging and security systems can benefit from using attributes of people and data to route messages and make access decisions. Such information can be extracted from enterprise information systems such as human resources records or labels on data and used to improve the privacy and efficiency of messaging and the management of access permissions to enterprise data resources. This project is developing theory, architectures, and applications for communication and information systems based on automated use and management of attributes.

Publications

Controlled Functional Encryption,
Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, Xiaofeng Wang, Erman Ayday, Jean-Pierre Hubaux, and Carl A. Gunter.
ACM Computer and Communication Security (CCS), Scottsdale AZ, November 2014.

MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control
Sonia Jahid, Carl A. Gunter, Imranul Hoque and Hamed Okhravi 
ACM Conference on Data and Application Security and Privacy, San Antonio, TX, February 2011. [BIB]

Attribute-Based Messaging: Access Control and Confidentiality
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan, Carl A. Gunter, Himanshu Khurana and Manoj Prabhakaran
ACM Transactions on Information and Systems Security (TISSEC), volume 13, number 4, December 2010.

A Medical Database Case Study for Reflective Databases Access Control
Lars Olson, Carl A. Gunter and Sarah Peterson Olson
Security and Privacy in Medical and Homecare Systems (SPIMACS ’09), Chicago, IL, November 2009. [PPT]

Reflective Database Access Control
Lars E. Olson
Doctoral Thesis, University of Illinois at Urbana-Champaign, October 2009. [PPT]

Sh@re: Negotiated Audit in Social Networks
Alejandro Gutierrez, Apeksha Godiyal, Matt Stockton, Michael LeMay, Carl A. Gunter and Roy H. Campbell
IEEE International Conference on Systems, Man, and Cybernetics (SMC ’09), San Antonio, TX, October 2009.

Implementing Reflective Access Control in SQL
Lars E. Olson, Carl A. Gunter, William R. Cook and Marianne Winslett
23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec ’09), Montreal, QC, July 2009. [PPT]

Security Policy Implementation Strategies for Common Carrier Monitoring Service Providers
Carl A. Gunter
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY ’09), London, UK, July 2009. [PPT][Related]

How to Bootstrap Security for Ad-Hoc Networks: Revisited
Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima and Toshiaki Tanaka
IFIP Information Security Conference (SEC ’09), Pafos, Cyprus, May 2009.

PBES: A Policy Based Encryption System with Application to Data Sharing in the Power Grid
Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, and Farhana Ashraf
ACM Symposium on Information, Computer and Communication Security (ASIACCS ’09), Sydney Australia, March 2009. [Related]

A Formal Framework for Reflective Database Access Control Policies
Lars E. Olson, Carl A. Gunter and P. Madhusudan
ACM Conference on Computer and Communications Security (CCS ’08), Alexandria, VA, October 2008. [PPT]

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
Michael LeMay, Omid Fatemieh and Carl A. Gunter
ACM Symposium on Access Control Models And Technologies (SACMAT ’07), Sophia Antipolis, France, Jun 2007. [PPT][BIB]

AMPol-Q: Adaptive Middleware Policy to Support QoS
Raja Afandi, Jianqing Zhang and Carl A. Gunter
ACM International Conference on Service Oriented Computing (ICSOC ’06), Chicago, IL, December 2006. [PPT][BIB]

AMPol: Adaptive Messaging Policy
Raja Afandi, Jianqing Zhang, Munawar Hafiz and Carl A. Gunter
IEEE European Conference on web Services (ECOWS ’06), Zurich, Switzerland, December 2006. [PPT][BIB]

Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Rakesh Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter and Himanshu Khurana
IEEE Annual Computer Security Applications Conference (ACSAC ’06) , Miami, FL, December 2006. [PPT][BIB]

AMPol-Q: Adaptive Middleware Policy to Support QoS
Raja Afandi, Jianqing Zhang, and Carl A. Gunter
Technical Report, full version of ICSOC ’06, Chicago, IL, December 2006.

Defeasible Security Policy Composition for Web Services
Adam J. Lee, Jodie P. Boyer, Lars E. Olson and Carl A. Gunter
ACM Formal Methods in Software Engineering (FMSE ’06), Alexandria, VA, November 2006. [PPT][BIB]

Using Attribute-Based Access Control to Enable Attribute-Based Messaging
Fariba Khan
Master of Science Thesis, University of Illinois at Urbana-Champaign, 2006.[BIB]

AMPOL: Adaptive Messaging Policy Based System
Raja N. Afandi
MS Thesis, University of Illinois at Urbana-Champaign, 2005.

Related Resources

Last updated on Thursday, June 26, 2014, 12:49 pm