Graph-based specification of access control policies

被引:33
|
作者
Koch, M
Mancini, LV
Parisi-Presicce, F
机构
[1] George Mason Univ, Informat & Software Engn, Fairfax, VA 22030 USA
[2] Free Univ Berlin, D-1000 Berlin, Germany
[3] Univ Roma La Sapienza, Rome, Italy
关键词
security; access control; graph transformation; graphical constraints; consistency; conflict detection; policy verification;
D O I
10.1016/j.jcss.2004.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal properties of graph transformations, it is possible to systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation for their resolutions. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 33
页数:33
相关论文
共 50 条
  • [1] A graph-based framework for the analysis of access control policies
    Alves, Sandra
    Fernandez, Maribel
    THEORETICAL COMPUTER SCIENCE, 2017, 685 : 3 - 22
  • [2] Graph-Based Specification of Admin-CBAC Policies
    Bertolissi, Clara
    Fernandez, Maribel
    Thuraisingham, Bhavani
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 173 - 184
  • [3] Rewrite Based Specification of Access Control Policies
    Cirstea, Horatiu
    Moreau, Pierre-Etienne
    de Oliveira, Anderson Santana
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 234 (0C) : 37 - 54
  • [4] Research of Graph-based Workflow Access Control
    Wei, Yonghe
    Shi, Chunjing
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 58 - 62
  • [5] Decidability of safety in graph-based models for access control
    Koch, M
    Mancini, LV
    Parisi-Presicce, F
    COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS, 2002, 2502 : 229 - 243
  • [6] An attribute graph based approach to map local access control policies to credential based access control policies
    Warner, J
    Atluri, V
    Mukkamala, R
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 134 - 147
  • [7] GRAPH-BASED DESIGN SPECIFICATION OF PARALLEL COMPUTATION
    IIZAWA, A
    KUNII, TL
    LECTURE NOTES IN COMPUTER SCIENCE, 1984, 163 : 132 - 160
  • [8] Naturally Interpretable Control Policies via Graph-Based Genetic Programming
    Nadizar, Giorgia
    Medvet, Eric
    Wilson, Dennis G.
    GENETIC PROGRAMMING, EUROGP 2024, 2024, 14631 : 73 - 89
  • [9] Specification of access control policies for web services
    Liu, Miao
    Zhang, Wei
    Liu, Huai-Liang
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 472 - 475
  • [10] Dynamic Access Control Policies: Specification and Verification
    Janicke, H.
    Cau, A.
    Siewe, F.
    Zedan, H.
    COMPUTER JOURNAL, 2013, 56 (04): : 440 - 463