Secure information sharing using role-based delegation

Gail Joon Ahn, Badrinath Mohan

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations


As computing becomes more pervasive, information sharing occurs in broad, highly dynamic network-based environments. Such pervasive computing environments pose a difficult challenge informally accessing the resources. The digital information generally represents sensitive and confidential information that organizations must protect and allow only authorized personnel to access and manipulate them. As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. In this paper we seek to address the issue of how to advocate selective information sharing while minimizing the risks of unauthorized access. We integrate a role-based delegation framework to propose a system architecture. We also demonstrate the feasibility of our framework through a proof-of-concept implementation.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Technology
Subtitle of host publicationCoding Computing, ITCC 2004
PublisherIEEE Computer Society
Number of pages6
ISBN (Print)0769521088, 9780769521084
StatePublished - 2004
Externally publishedYes
EventInternational Conference on Information Technology: Coding Computing, ITCC 2004 - Las Vegas, NV, United States
Duration: Apr 5 2004Apr 7 2004

Publication series

NameInternational Conference on Information Technology: Coding Computing, ITCC


OtherInternational Conference on Information Technology: Coding Computing, ITCC 2004
Country/TerritoryUnited States
CityLas Vegas, NV


  • Delegation
  • Information Sharing
  • Role-based

ASJC Scopus subject areas

  • Software
  • Information Systems
  • General Engineering


Dive into the research topics of 'Secure information sharing using role-based delegation'. Together they form a unique fingerprint.

Cite this