Dynamic adaptation of access control policies

被引:0
|
作者
Bharadwaj, V [1 ]
Baras, J [1 ]
机构
[1] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We describe an architecture and algorithms for deriving an access control policy by composing access control requirements specified at multiple levels in a command hierarchy. Our method can detect conflicts in requirements, and find a policy that maximally satisfies the requirements, by satisfying higher priority requirements at the expense of lower priority ones. It also allows for easy verification of the filial policy by an administrator The architecture allows quick adaptation of policies to changing situations, by providing for delegation of authority while ensuring that high priority requirements will always be satisfied.
引用
收藏
页码:761 / 766
页数:6
相关论文
共 50 条
  • [1] Conformance Checking of Dynamic Access Control Policies
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    [J]. FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 227 - 242
  • [2] Dynamic Access Control Policies: Specification and Verification
    Janicke, H.
    Cau, A.
    Siewe, F.
    Zedan, H.
    [J]. COMPUTER JOURNAL, 2013, 56 (04): : 440 - 463
  • [3] Context-aware adaptation of access-control policies
    Samuel, Arjmand
    Ghafoor, Arif
    Bertino, Elisa
    [J]. IEEE INTERNET COMPUTING, 2008, 12 (01) : 51 - 54
  • [4] Specifying and enforcing constraints in dynamic access control policies
    Essaouini, Nada
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    El Kalam, Anas Abou
    [J]. 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 290 - 297
  • [5] Specifying and reasoning about dynamic access-control policies
    Dougherty, Daniel J.
    Fisler, Kathi
    Krishnamurthi, Shriram
    [J]. AUTOMATED REASONING, PROCEEDINGS, 2006, 4130 : 632 - 646
  • [6] Automatic enforcement of access control policies among dynamic coalitions
    Atluri, V
    Warner, J
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2004, 3347 : 369 - 378
  • [7] Dynamic deployment of Access and Usage Control Policies Using Aspects
    Ayed, Samiha
    Idrees, Muhammad Sabir
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    [J]. 2015 INTERNATIONAL CONFERENCE ON PROTOCOL ENGINEERING (ICPE) AND INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES OF DISTRIBUTED SYSTEMS (NTDS), 2015,
  • [8] On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
    Garrison, William C., III
    Shull, Adam
    Myers, Steven
    Lee, Adam J.
    [J]. 2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 819 - 838
  • [9] Model Checking Agent Knowledge in Dynamic Access Control Policies
    Koleini, Masoud
    Ritter, Eike
    Ryan, Mark
    [J]. TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2013, 2013, 7795 : 448 - 462
  • [10] Dynamic access-control policies on XML encrypted data
    Bouganim, Luc
    Ngoc, Francois Dang
    Pucheral, Philippe
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)