Graph-based specification of access control policies

被引:33
|
作者
Koch, M
Mancini, LV
Parisi-Presicce, F
机构
[1] George Mason Univ, Informat & Software Engn, Fairfax, VA 22030 USA
[2] Free Univ Berlin, D-1000 Berlin, Germany
[3] Univ Roma La Sapienza, Rome, Italy
关键词
security; access control; graph transformation; graphical constraints; consistency; conflict detection; policy verification;
D O I
10.1016/j.jcss.2004.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal properties of graph transformations, it is possible to systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation for their resolutions. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 33
页数:33
相关论文
共 50 条
  • [1] A graph-based framework for the analysis of access control policies
    Alves, Sandra
    Fernandez, Maribel
    THEORETICAL COMPUTER SCIENCE, 2017, 685 : 3 - 22
  • [2] Graph-Based Specification of Admin-CBAC Policies
    Bertolissi, Clara
    Fernandez, Maribel
    Thuraisingham, Bhavani
    PROCEEDINGS OF THE ELEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '21), 2021, : 173 - 184
  • [3] Research of Graph-based Workflow Access Control
    Wei, Yonghe
    Shi, Chunjing
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 58 - 62
  • [4] Dynamic Access Control Policies: Specification and Verification
    Janicke, H.
    Cau, A.
    Siewe, F.
    Zedan, H.
    COMPUTER JOURNAL, 2013, 56 (04) : 440 - 463
  • [5] Graph Transformations for the Specification of Access Control in Workflow
    Wei, Yonghe
    Wang, Chengen
    Peng, Wuliang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12608 - +
  • [6] Specification and Analysis of Attribute-Based Access Control Policies: An Overview
    Xu, Dianxiang
    Zhang, Yunpeng
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 41 - 49
  • [7] A Lightweight Graph-Based Model for Inter-networking Access Control
    Kang, Zhongmiao
    Jiang, Wenting
    Chen, Yan
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 589 - 597
  • [8] UML specification of access control policies and their formal verification
    Koch M.
    Parisi-Presicce F.
    Software & Systems Modeling, 2006, 5 (4) : 429 - 447
  • [9] A Privacy-aware Graph-based Access Control System for the Healthcare Domain
    Tian, Yuan
    Song, Biao
    Hassan, M. Mehedi
    Huh, Eui-Nam
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2708 - 2730
  • [10] Graph-Based Data-Collection Policies for the Internet of Things
    Fernandez, Maribel
    Jaimunk, Jenjira
    Thuraisingham, Bhavani
    4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018), 2018, : 9 - 16