A framework for automated negotiation of access control policies

被引:0
作者
Bharadwaj, VG [1 ]
Baras, JS [1 ]
机构
[1] Univ Maryland, Syst Res Inst, College Pk, MD 20742 USA
来源
DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS | 2003年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Our research examines the problem of negotiating access control policies between autonomous domains. Our objective is to develop software agents that can automatically negotiate access control policies between autonomous domains with minimal human guidance. In this paper we describe a mathematical framework that is capable of expressing many such negotiation problems, and illustrate its application to some practical scenarios.
引用
收藏
页码:216 / 221
页数:6
相关论文
共 50 条
[21]   Automated verification of access control policies using a SAT solver [J].
Graham Hughes ;
Tevfik Bultan .
International Journal on Software Tools for Technology Transfer, 2008, 10 (6) :503-520
[22]   Automated Analysis of Access Control Policies Based on Model Checking [J].
Truong A. .
SN Computer Science, 2020, 1 (6)
[23]   Towards an interdisciplinary framework for automated negotiation [J].
Lopes, Fernando ;
Novais, A. Q. ;
Coelho, Helder .
E-COMMERCE AND WEB TECHNOLOGIES, PROCEEDINGS, 2008, 5183 :81-+
[24]   A conceptual framework for automated negotiation systems [J].
Resinas, Manuel ;
Fernandez, Pablo ;
Corchuelo, Rafael .
INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2006, PROCEEDINGS, 2006, 4224 :1250-1258
[25]   A Security Framework for Scientific Workflow Provenance Access Control Policies [J].
Bhuyan, Fahima Amin ;
Lu, Shiyong ;
Reynolds, Robert ;
Zhang, Jia ;
Ahmed, Ishtiaq .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2022, 15 (01) :97-109
[26]   EXTENDING THE ISO ACCESS-CONTROL FRAMEWORK FOR MULTIPLE POLICIES [J].
ABRAMS, MD ;
JOYCE, MV .
COMPUTER SECURITY, 1993, 37 :343-358
[27]   A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies [J].
Margheri, Andrea ;
Masi, Massimiliano ;
Pugliese, Rosario ;
Tiezzi, Francesco .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (01) :2-33
[28]   A graph-based framework for the analysis of access control policies [J].
Alves, Sandra ;
Fernandez, Maribel .
THEORETICAL COMPUTER SCIENCE, 2017, 685 :3-22
[29]   Towards Automated Learning of Access Control Policies Enforced by Web Applications [J].
Iyer, Padmavathi ;
Masoumzadeh, Amir .
PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, :163-168
[30]   Automated Generation, Verification, and Ranking of Secure SoC Access Control Policies [J].
Meza, Andres ;
Kastner, Ryan .
2023 CYBER-PHYSICAL SYSTEMS AND INTERNET-OF-THINGS WEEK, CPS-IOT WEEK WORKSHOPS, 2023, :198-202