Graph-based specification of access control policies

被引:33
|
作者
Koch, M
Mancini, LV
Parisi-Presicce, F
机构
[1] George Mason Univ, Informat & Software Engn, Fairfax, VA 22030 USA
[2] Free Univ Berlin, D-1000 Berlin, Germany
[3] Univ Roma La Sapienza, Rome, Italy
关键词
security; access control; graph transformation; graphical constraints; consistency; conflict detection; policy verification;
D O I
10.1016/j.jcss.2004.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal properties of graph transformations, it is possible to systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation for their resolutions. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 33
页数:33
相关论文
共 50 条
  • [21] Weaving Rewrite-Based Access Control Policies
    de Oliveira, Anderson Santana
    Wang, Eric Ke
    Kirchner, Claude
    Kirchner, Helene
    FMSE'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON FORMAL METHODS IN SECURITY ENGINEERING, 2007, : 71 - 80
  • [22] Category-Based Administrative Access Control Policies
    Bertolissi, Clara
    Fernandez, Maribel
    Thuraisingham, Bhavani
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2025, 28 (01)
  • [23] Detecting Inconsistency and Incompleteness in Access Control Policies
    Zhang, Hongbin
    Ma, Pengcheng
    Wang, Meihua
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 731 - 739
  • [24] Detecting conflict of heterogeneous access control policies
    Yu, Mingjie
    Li, Fenghua
    Yu, Nenghai
    Wang, Xiao
    Guo, Yunchuan
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (05) : 664 - 679
  • [25] Graph theory based representation of building information models for access control applications
    Skandhakumar, Nimalaprakasan
    Salim, Farzad
    Reid, Jason
    Drogemuller, Robin
    Dawson, Ed
    AUTOMATION IN CONSTRUCTION, 2016, 68 : 44 - 51
  • [26] Work-Based Access Control Model for Cooperative Healthcare Environments: Formal Specification and Verification
    Abomhara M.
    Yang H.
    Køien G.M.
    Lazreg M.B.
    Journal of Healthcare Informatics Research, 2017, 1 (1) : 19 - 51
  • [27] DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement
    Kirrane, Sabrina
    SEMANTIC WEB - ISWC 2011, PT II, 2011, 7032 : 293 - 300
  • [28] Graph-Based IoT Microservice Security
    Pahl, Marc-Oliver
    Aubet, Francois-Xavier
    Liebald, Stefan
    NOMS 2018 - 2018 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2018,
  • [29] Dynamic graph-based software fingerprinting
    Collberg, Christian S.
    Thomborson, Clark
    Townsend, Gregg M.
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2007, 29 (06):
  • [30] Graph-Based Profiling of Blockchain Oracles
    Almi'Ani, Khaled
    Lee, Young Choon
    Alrawashdeh, Tawfiq
    Pasdar, Amirmohammad
    IEEE ACCESS, 2023, 11 (24995-25007) : 24995 - 25007