Graph-based specification of access control policies

被引:33
|
作者
Koch, M
Mancini, LV
Parisi-Presicce, F
机构
[1] George Mason Univ, Informat & Software Engn, Fairfax, VA 22030 USA
[2] Free Univ Berlin, D-1000 Berlin, Germany
[3] Univ Roma La Sapienza, Rome, Italy
关键词
security; access control; graph transformation; graphical constraints; consistency; conflict detection; policy verification;
D O I
10.1016/j.jcss.2004.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal properties of graph transformations, it is possible to systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation for their resolutions. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 33
页数:33
相关论文
共 50 条
  • [31] Graph-Based Random Sampling for Massive Access in IoT Networks
    Zhai, Shiyu
    Li, Guobing
    Qi, Zefeng
    Zhang, Guomei
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [32] A Knowledge Graph-Based Consistency Detection Method for Network Security Policies
    Chen, Yaang
    Hu, Teng
    Lou, Fang
    Yin, Mingyong
    Zeng, Tao
    Wu, Guo
    Wang, Hao
    APPLIED SCIENCES-BASEL, 2024, 14 (18):
  • [33] A heterogeneous graph-based semi-supervised learning framework for access control decision-making
    Yin, Jiao
    Chen, Guihong
    Hong, Wei
    Cao, Jinli
    Wang, Hua
    Miao, Yuan
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2024, 27 (04):
  • [34] A Control Flow Graph-based Signature for Packer Identification
    Saleh, Moustafa
    Ratazzi, E. Paul
    Xu, Shouhuai
    MILCOM 2017 - 2017 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2017, : 683 - 688
  • [35] Graph-Based Inverse Optimal Control for Robot Manipulation
    Byravan, Arunkumar
    Monfort, Mathew
    Ziebart, Brian
    Boots, Byron
    Fox, Dieter
    PROCEEDINGS OF THE TWENTY-FOURTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI), 2015, : 1874 - 1880
  • [36] Graph-Based Modeling for Adaptive Control in Assistance Systems
    Streicher, Alexander
    Schoenbein, Rainer
    Pick, Stefan
    ADVANCES IN ARTIFICIAL INTELLIGENCE, SOFTWARE AND SYSTEMS ENGINEERING (AHFE 2021), 2021, 271 : 39 - 46
  • [37] Graph-based version control for asynchronous BIM collaboration
    Esser, Sebastian
    Vilgertshofer, Simon
    Borrmann, Andre
    ADVANCED ENGINEERING INFORMATICS, 2022, 53
  • [38] Graph-Based Distributed Control in Vehicular Communications Networks
    Zhao, Jikui
    Dong, Yudi
    Wang, Huaxia
    2023 IEEE 97TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-SPRING, 2023,
  • [39] SUPERSEDING MANUAL GENERATION OF ACCESS-CONTROL SPECIFICATION - FROM POLICIES TO PROFILES
    POTTAS, D
    VONSOLMS, SH
    COMPUTER SECURITY, 1993, 37 : 327 - 342
  • [40] Cooperative caching in fog radio access networks: a graph-based approach
    Jiang, Yanxiang
    Cui, Xiaoting
    Bennis, Mehdi
    Zheng, Fu-Chun
    Fan, Baotian
    You, Xiaohu
    IET COMMUNICATIONS, 2019, 13 (20) : 3519 - 3528