Graph-based specification of access control policies

被引:33
|
作者
Koch, M
Mancini, LV
Parisi-Presicce, F
机构
[1] George Mason Univ, Informat & Software Engn, Fairfax, VA 22030 USA
[2] Free Univ Berlin, D-1000 Berlin, Germany
[3] Univ Roma La Sapienza, Rome, Italy
关键词
security; access control; graph transformation; graphical constraints; consistency; conflict detection; policy verification;
D O I
10.1016/j.jcss.2004.11.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Graph-based specification formalisms for access control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation that allows the detailed comparison of different policy models. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Several models for AC (e.g. role-based, lattice-based or an access control list) can be specified in this framework. The framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of inconsistent policies. Using formal properties of graph transformations, it is possible to systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation for their resolutions. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 33
页数:33
相关论文
共 50 条
  • [31] Graph-based synchronous collaborative mapping
    Kang, Xiaochen
    GEOCARTO INTERNATIONAL, 2015, 30 (01) : 28 - 47
  • [32] Purpose-Based Access Control Policies and Conflicting Analysis
    Wang, Hua
    Sun, Lili
    Varadharajan, Vijay
    SECURITY AND PRIVACY - SILVER LININGS IN THE CLOUD, 2010, 330 : 217 - +
  • [33] Attribute-based access control policies composition algebra
    Lin, Li
    Huai, Jin-Peng
    Li, Xian-Xian
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (02): : 403 - 414
  • [34] An MDA-Based Environment for Generating Access Control Policies
    Klarl, Heiko
    Marme, Florian
    Wolff, Christian
    Emig, Christian
    Abeck, Sebastian
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2009, 5695 : 115 - +
  • [35] Automated Analysis of Access Control Policies Based on Model Checking
    Truong A.
    SN Computer Science, 2020, 1 (6)
  • [36] Certiricate-based access control policies description language
    Pejas, J
    ARTIFICIAL INTELLIGENCE AND SECURITY IN COMPUTING SYSTEMS, 2003, 752 : 191 - 202
  • [37] Model Checking Distributed Mandatory Access Control Policies
    Alexander, Perry
    Pike, Lee
    Loscocco, Peter
    Coker, George
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (02)
  • [38] Specification and analysis of a protocol Optimistic access control for publishers collaborative distributed
    Spécification et analyse d’un protocole de contrôle d’accès optimiste pour éditeurs collaboratifs répartis
    1600, Lavoisier (19): : 9 - 32
  • [39] Semantic access control model:: A formal specification
    Yagüe, MI
    Gallardo, MD
    Maña, A
    COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS, 2005, 3679 : 24 - 43
  • [40] Graph-based relational learning with application to security
    Holder, L
    Cook, D
    Coble, J
    Mukherjee, M
    FUNDAMENTA INFORMATICAE, 2005, 66 (1-2) : 83 - 101