Modeling contextual security policies

被引:0
|
作者
Frédéric Cuppens
Nora Cuppens-Boulahia
机构
[1] GET/ENST Bretagne,
关键词
Security policy; Context awareness; Access control; OrBAC;
D O I
暂无
中图分类号
学科分类号
摘要
As computer infrastructures become more complex, security models must provide means to handle more flexible and dynamic requirements. In the Organization Based Access Control (OrBAC) model, it is possible to express such requirements using the notion of context. In OrBAC, each security rule (permission, prohibition, obligation or dispensation) only applies in a given context. A context is viewed as an extra condition that must be satisfied to activate a given security rule. In this paper, we present a taxonomy of different types of context and investigate the data the information system must manage in order to deal with these different contexts. We then explain how to model and evaluate them in the OrBAC model.
引用
收藏
页码:285 / 305
页数:20
相关论文
共 50 条
  • [41] EU Security Policies and Their Prospects
    Walter Kolbow
    InternationalUnderstanding, 2007, (02) : 28 - 30
  • [42] The case for abstracting security policies
    Madhavapeddy, A
    Mycroft, A
    Scott, D
    Sharp, R
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 156 - 160
  • [43] Security policies and numerical surveillance
    不详
    ESPRIT, 2015, (02) : 157 - 158
  • [44] Verification of Cloud Security Policies
    Miller, Loic
    Merindol, Pascal
    Gallais, Antoine
    Pelsser, Cristel
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [45] An economic analysis of security policies
    Brueck, Tilman
    ECONOMIC ANALYSIS OF TERRORISM, 2006, : 262 - 281
  • [46] A Theory of Gray Security Policies
    Ray, Donald
    Ligatti, Jay
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 481 - 499
  • [47] Programming with explicit security policies
    Myers, AC
    PROGRAMMING LANGUAGES AND SYSTEMS, PROCEEDINGS, 2005, 3444 : 1 - 4
  • [48] Social Networks Security Policies
    Dhouioui, Zeineb
    Alqahtani, Abdullah Ali
    Akaichi, Jalel
    INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016, 2016, 55 : 395 - 403
  • [49] African policies for peace and security
    Gnanguenon, Amandinc
    ETUDES INTERNATIONALES, 2011, 42 (03): : 422 - 423
  • [50] Enforceable Security Policies Revisited
    Basin, David
    Juge, Vincent
    Klaedtke, Felix
    Zalinescu, Eugen
    PRINCIPLES OF SECURITY AND TRUST, POST 2012, 2012, 7215 : 309 - 328