Hybrid authorizations and conflict resolution

被引:0
作者
Chinaei, Amir H. [1 ]
Zhang, Huaxin [1 ]
机构
[1] Univ Waterloo, David R Cheriton Sch Comp Sci, Waterloo, ON N2L 3G1, Canada
来源
SECURE DATA MANAGEMENT | 2006年 / 4165卷
关键词
access control; conflict resolution; combined strategies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Numerous authorization models have been proposed in recent years. While some models support either positive or negative authorizations, hybrid models take advantage of both authorizations simultaneously. However, resolving authorization conflicts is quite a challenge in such models due to the existence of sophisticated hierarchies and diversity of types of resolution strategies. There are works that have addressed conflict resolution for tree-structured subject hierarchies. Yet, no widespread framework has been proposed for graph-based structures. A widespread resolution framework ought to provide several resolution strategies and to support sophisticated structures. Our attempt is to define such a framework. In particular, our framework resolves conflicts for subject hierarchies that form directed acyclic graphs. It also unites major resolution policies in a novel way by which thirty-two combined strategies are simultaneously expressed. We also provide parametric algorithms to support the strategies and to justify the framework with our analysis and experiments.
引用
收藏
页码:131 / 145
页数:15
相关论文
共 16 条
  • [1] Aho A. V., 1972, SIAM Journal on Computing, V1, P131, DOI 10.1137/0201008
  • [2] [Anonymous], 1999, ACM T INFORM SYST SE
  • [3] A flexible authorization mechanism for relational data management systems
    Bertino, E
    Jajodia, S
    Samarati, P
    [J]. ACM TRANSACTIONS ON INFORMATION SYSTEMS, 1999, 17 (02) : 101 - 140
  • [4] Merging security policies: analysis of a practical example
    Cuppens, F
    Cholvy, L
    Saurel, C
    Carrere, J
    [J]. 11TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP - PROCEEDINGS, 1998, : 123 - 136
  • [5] Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
  • [6] Ferriaolo David, 1992, P 15 NATL COMP SEC C, P554
  • [7] PROTECTION IN OPERATING-SYSTEMS
    HARRISON, MA
    RUZZO, WL
    ULLMAN, JD
    [J]. COMMUNICATIONS OF THE ACM, 1976, 19 (08) : 461 - 470
  • [8] SCALE AND PERFORMANCE IN A DISTRIBUTED FILE SYSTEM
    HOWARD, JH
    KAZAR, ML
    MENEES, SG
    NICHOLS, DA
    SATYANARAYANAN, M
    SIDEBOTHAM, RN
    WEST, MJ
    [J]. ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1988, 6 (01): : 51 - 81
  • [9] Flexible support for multiple access control policies
    Jajodia, S
    Samarati, P
    Sapino, ML
    Subrahmanian, VS
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 2001, 26 (02): : 214 - 260
  • [10] JOSHI JBD, 2003, P 8 ACM S ACC CONTR, P51, DOI DOI 10.1145/775412.775420