A scalable modeling language for specifying access control in tree based structures

被引:0
|
作者
Oslebo, Arne
机构
关键词
D O I
10.1109/INM.2007.374719
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Configuring and managing access control in today's heterogeneous systems is a big challenge. While there exist many standards for authentication, different types of systems often have different methods for configuring the access control. In this paper we propose a new policy based graphical modeling language that can be used for modeling and configuring access control in a wide range of different systems. The only requirement is that the information which is being controlled by the access control system is stored in a tree-based structure.
引用
收藏
页码:809 / 812
页数:4
相关论文
共 50 条
  • [1] An access control model for tree data structures
    Gabillon, A
    Munier, M
    Bascou, JJ
    Gallon, L
    Bruno, E
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2002, 2433 : 117 - 135
  • [2] Specifying role-based access constraints with object constraint language
    Wang, H
    Zhang, YC
    Cao, JL
    Yang, J
    [J]. ADVANCED WEB TECHNOLOGIES AND APPLICATIONS, 2004, 3007 : 687 - 696
  • [3] LANGUAGE EXTENSIONS FOR SPECIFYING PROGRAM ACCESS-CONTROL POLICIES IN PROGRAMMING-LANGUAGES
    CLAYBROOK, BG
    HARTSON, HR
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 1983, 3 (02) : 155 - 162
  • [4] A language for specifying recursive traversals of object structures
    Ovlinger, J
    Wand, M
    [J]. ACM SIGPLAN NOTICES, 1999, 34 (10) : 70 - 81
  • [5] Tree-Based Cryptographic Access Control
    Alderman, James
    Farley, Naomi
    Crampton, Jason
    [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 47 - 64
  • [6] Specifying access control policies on data streams
    Carminati, Barbara
    Ferraris, Elena
    Tang, Kian Lee
    [J]. ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 410 - +
  • [7] Specifying multimedia access control using RDF
    Kodali, N
    Farkas, C
    Wijesekera, D
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2004, 19 (03): : 129 - 139
  • [8] Specifying and enforcing the principle of least privilege in role-based access control
    Ma, Xiaopu
    Li, Ruixuan
    Lu, Zhengding
    Lu, Jianfeng
    Dong, Meng
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (12): : 1313 - 1331
  • [9] Tower: A language for role based access control
    Hitchens, M
    Varadharajan, V
    [J]. POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, 1995 : 88 - 106
  • [10] Redaction based RDF Access Control Language
    Rachapalli, Jyothsna
    Khadilkar, Vaibhav
    Kantarcioglu, Murat
    Thuraisingham, Bhavani
    [J]. PROCEEDINGS OF THE 19TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'14), 2014, : 177 - 180