Access control policies and languages

被引:0
|
作者
di Vimercati, Sabrina De Capitani [1 ]
Foresti, Sara [1 ]
Samarati, Pierangela [1 ]
Jajodia, Sushil [2 ,3 ]
机构
[1] Univ Milan, DTI, I-26013 Crema, Italy
[2] George Mason Univ, Informat Technol, Fairfax, VA 22030 USA
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
authorisation hierarchies; positive and negative authorisations; attribute-based access control;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.
引用
收藏
页码:94 / 102
页数:9
相关论文
共 50 条
  • [31] Conformance Checking of Dynamic Access Control Policies
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    FORMAL METHODS AND SOFTWARE ENGINEERING, 2011, 6991 : 227 - 242
  • [32] Composing access control policies of distributed components
    Tilak, Omkar J.
    Raje, Rajeev R.
    Zou, Xukai
    DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 301 - +
  • [33] A framework for automated negotiation of access control policies
    Bharadwaj, VG
    Baras, JS
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 216 - 221
  • [34] On the Incoherencies in Web Browser Access Control Policies
    Singh, Kapil
    Moshchuk, Alexander
    Wang, Helen J.
    Lee, Wenke
    2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, : 463 - 478
  • [35] Distributed access control policies for spectrum sharing
    Baldini, Gianmarco
    Fovino, Igor Nai
    Braghin, Stefano
    Trombetta, Alberto
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 925 - 935
  • [36] Adaptive Access Control Policies for IoT Deployments
    Alkhresheh, Ashraf
    Elgazzar, Khalid
    Hassanein, Hossam S.
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 377 - 383
  • [37] Data Sharing in Presence of Access Control Policies
    Agoun, Juba
    Hacid, Mohand-Said
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2019 CONFERENCES, 2019, 11877 : 301 - 309
  • [38] Aggregating and deploying network access control policies
    Alfaro, Joaquin G.
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 532 - +
  • [39] Algebraic Model for Handling Access Control Policies
    Sabri, Khair Eddin
    Hiary, Hazem
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 653 - 657
  • [40] Oblivious Transfer with Hidden Access Control Policies
    Camenisch, Jan
    Dubovitskaya, Maria
    Neven, Gregory
    Zaverucha, Gregory M.
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 192 - +