Modeling contextual security policies

被引:0
|
作者
Frédéric Cuppens
Nora Cuppens-Boulahia
机构
[1] GET/ENST Bretagne,
关键词
Security policy; Context awareness; Access control; OrBAC;
D O I
暂无
中图分类号
学科分类号
摘要
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (OrBAC) model, it is possible to express such requirements using the notion of context. In OrBAC, each security rule (permission, prohibition, obligation or dispensation) only applies in a given context. A context is viewed as an extra condition that must be satisfied to activate a given security rule. In this paper, we present a taxonomy of different types of context and investigate the data the information system must manage in order to deal with these different contexts. We then explain how to model and evaluate them in the OrBAC model.
引用
收藏
页码:285 / 305
页数:20
相关论文
共 50 条
  • [21] Certified Lightweight Contextual Policies for Android
    Seghir, Mohamed Nassim
    Aspinall, David
    Marekova, Lenka
    2016 IEEE CYBERSECURITY DEVELOPMENT (IEEE SECDEV 2016), 2016, : 94 - 100
  • [22] Understanding contextual heterogeneity in the outcomes of large-scale security policies: evidence from Italy (2007–12)
    Marco Calaresu
    Moris Triventi
    Crime, Law and Social Change, 2022, 77 : 529 - 554
  • [23] SECURITY POLICIES AND THEIR CONNECTION WITH SECURITY STRATEGY AND SECURITY MANAGEMENT
    LIPPOLD, H
    STELZER, D
    KONRAD, P
    WIRTSCHAFTSINFORMATIK, 1992, 34 (04): : 367 - 377
  • [24] On Quantitative Security Policies
    Degano, Pierpaolo
    Ferrari, Gian-Luigi
    Mezzetti, Gianluca
    PARALLEL COMPUTING TECHNOLOGIES, 2011, 6873 : 23 - 39
  • [25] Security and its policies
    Mazza, Angelino
    TRIA-TERRITORIO DELLA RICERCA SU INSEDIAMENTI E AMBIENTE, 2008, 1 (01) : 168 - 169
  • [26] SECURITY AND DETENTE POLICIES
    WOYKE, W
    GEGENWARTSKUNDE GESELLSCHAFT STAAT ERZIEHUNG, 1981, 30 (01): : 95 - 98
  • [27] DEVELOPMENT OF SECURITY POLICIES
    OLNES, J
    COMPUTERS & SECURITY, 1994, 13 (08) : 628 - 636
  • [28] The impact of contextual factors on the security of code
    Shoemaker, Dan
    Woody, Carol
    CrossTalk, 2015, 28 (03): : 15 - 19
  • [29] Understanding contextual heterogeneity in the outcomes of large-scale security policies: evidence from Italy (2007-12)
    Calaresu, Marco
    Triventi, Moris
    CRIME LAW AND SOCIAL CHANGE, 2022, 77 (05) : 529 - 554
  • [30] A security scheme for protecting security policies in firewall
    Lee, Jung-Seuk
    Jeon, Jun-Cheol
    Yoo, Kee-Young
    Operating Systems Review (ACM), 2004, 38 (02): : 69 - 72