Safety problems in access control with temporal constraints

被引:0
|
作者
Balbiani, P [1 ]
Cheikh, F [1 ]
机构
[1] Univ Toulouse 3, Inst Rech Informat Toulouse, F-31062 Toulouse, France
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of access control mechanisms use the matrix model to represent protection states of computer systems. We present a variant of the access control matrix model obtained by incorporating temporal constraints saying that "subject s has right r on object o since at least duration d". In connection with this enriched model, we also discuss the decidable and undecidable cases of one of the major themes of computer security, namely the classical safety problem for access control matrices.
引用
收藏
页码:165 / 178
页数:14
相关论文
共 50 条
  • [1] A mandatory access control model with temporal and spatial constraints
    Fan, Yan-Fang
    Cai, Ying
    Geng, Xiu-Hua
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2012, 35 (05): : 111 - 114
  • [2] An access control model supporting periodicity constraints and temporal reasoning
    Bertino, E
    Bettini, C
    Ferrari, E
    Samarati, P
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 1998, 23 (03): : 231 - 285
  • [3] Coordinated access control with temporal and spatial constraints on mobile execution in coalition environments
    Fu, Song
    Xu, Cheng-Zhong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2007, 23 (06): : 804 - 815
  • [4] Comparative Attribute Access Control Scheme Based on Spatio-temporal Constraints in Cloud
    Zhang, Junling
    Wang, Ze
    Zhao, Ping
    Gao, Minghua
    Sun, Shimin
    International Journal of Network Security, 2022, 24 (03) : 469 - 481
  • [5] Description of Temporal Constraints Using Semantic Web in Role-Based Access Control
    Tanihira, Kazushi
    Sakamoto, Yusuke
    Kobayashi, Hiromi
    KNOWLEDGE-BASED SOFTWARE ENGINEERING, 2006, 140 : 186 - 195
  • [6] Trust and Risk based Access Control and Access Control Constraints
    Helil, Nurmamat
    Kim, Mucheol
    Han, Sangyong
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (11): : 2254 - 2271
  • [7] Safety-Critical Control for Control Affine Systems under Spatio-Temporal and Input Constraints
    Wang, Shang
    Liu, Fangzhou
    Li, Cong
    Liu, Qingchen
    ELECTRONICS, 2023, 12 (09)
  • [8] Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way
    Zavatteri, Matteo
    Combi, Carlo
    Rizzi, Romeo
    Vigano, Luca
    INFORMATION AND COMPUTATION, 2021, 280
  • [9] A Framework for Access Control with Inference Constraints
    Katos, Vasilios
    Vrakas, Dimitrios
    Katsaros, Panagiotis
    2011 35TH IEEE ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), 2011, : 289 - 297
  • [10] Classification model for access control constraints
    Kohler, Mathias
    Liesegang, Christian
    Schaad, Andreas
    2007 IEEE International Performance Computing and Communications Conference, Vols 1 and 2, 2007, : 410 - 417