Graph-based specification of access control policies

被引:33
|
作者
Koch, M
Mancini, LV
Parisi-Presicce, F
机构
[1] George Mason Univ, Informat & Software Engn, Fairfax, VA 22030 USA
[2] Free Univ Berlin, D-1000 Berlin, Germany
[3] Univ Roma La Sapienza, Rome, Italy
关键词
security; access control; graph transformation; graphical constraints; consistency; conflict detection; policy verification;
D O I
10.1016/j.jcss.2004.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal properties of graph transformations, it is possible to systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation for their resolutions. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 33
页数:33
相关论文
共 50 条
  • [41] Towards Graph-based and Semantic Search in Legal Information Access Systems
    Mimouni, Nada
    Nazarenko, Adeline
    Paul, Eve
    Salotti, Sylvie
    LEGAL KNOWLEDGE AND INFORMATION SYSTEMS, 2014, 271 : 163 - 168
  • [42] Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access
    Paolini, Enrico
    Liva, Gianluigi
    Chiani, Marco
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2015, 61 (12) : 6815 - 6832
  • [43] A Graph-Based Collision Resolution Scheme for Asynchronous Unsourced Random Access
    Li, Tianya
    Wu, Yongpeng
    Zhang, Wenjun
    Xia, Xiang-Gen
    Xiao, Chengshan
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 4014 - 4019
  • [44] A Graph-Based Random Access Protocol for Crowded Massive MIMO Systems
    Han, Huimei
    Li, Ying
    Guo, Xudong
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (11) : 7348 - 7361
  • [45] GRAPH-BASED DEINTERLACING
    Roussel, Jerome
    Bertolino, Pascal
    2008 15TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING, VOLS 1-5, 2008, : 897 - 900
  • [46] A model-driven approach for the visual specification of Role-Based Access Control policies in web systems
    Diaz, Paloma
    Aedo, Ignacio
    Sanz, Daniel
    Malizia, Alessio
    2008 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN-CENTRIC COMPUTING, PROCEEDINGS, 2008, : 203 - 210
  • [47] Access Control Policy Specification Language Based on Metamodel
    Luo Y.
    Shen Q.-N.
    Wu Z.-H.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (02): : 439 - 454
  • [48] Model-Based Specification and Refinement of Usage Control Policies
    Neisse, Ricardo
    Doerr, Joerg
    2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 169 - 176
  • [49] A Graph-Based Resource Sharing and Admission Control for Vehicular Networks
    Gao, Lei
    Hou, Yanzhao
    Tao, Xiaofeng
    Zhu, Min
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE WORKSHOP (WCNCW), 2019,
  • [50] Rewriting-Based Access Control Policies
    de Oliveira, Anderson Santana
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 171 (04) : 59 - 72