Access control policies and languages

被引:0
|
作者
di Vimercati, Sabrina De Capitani [1 ]
Foresti, Sara [1 ]
Samarati, Pierangela [1 ]
Jajodia, Sushil [2 ,3 ]
机构
[1] Univ Milan, DTI, I-26013 Crema, Italy
[2] George Mason Univ, Informat Technol, Fairfax, VA 22030 USA
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
authorisation hierarchies; positive and negative authorisations; attribute-based access control;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.
引用
收藏
页码:94 / 102
页数:9
相关论文
共 50 条
  • [1] Policies, models, and languages for access control
    di Vimercati, SD
    Samarati, P
    Jajodia, S
    DATABASES IN NETWORKED INFORMATION SYSTEMS, PROCEEDINGS, 2005, 3433 : 225 - 237
  • [2] A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages
    Rosa, Marco
    Barraca, Joao Paulo
    Zuquete, Andre
    Rocha, Nelson Pacheco
    JOURNAL OF MEDICAL SYSTEMS, 2019, 44 (02)
  • [3] A Parser to Support the Definition of Access Control Policies and Rules Using Natural Languages
    Marco Rosa
    João Paulo Barraca
    André Zuquete
    Nelson Pacheco Rocha
    Journal of Medical Systems, 2020, 44
  • [4] LANGUAGE EXTENSIONS FOR SPECIFYING PROGRAM ACCESS-CONTROL POLICIES IN PROGRAMMING-LANGUAGES
    CLAYBROOK, BG
    HARTSON, HR
    JOURNAL OF SYSTEMS AND SOFTWARE, 1983, 3 (02) : 155 - 162
  • [5] Resiliency Policies in Access Control
    Li, Ninghui
    Wang, Qihua
    Tripunitara, Mahesh
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (04)
  • [6] On the negotiation of access control policies
    Gligor, VD
    Khurana, H
    Koleva, RK
    Bharadwaj, VG
    Baras, JS
    SECURITY PROTOCOLS, 2002, 2467 : 188 - 201
  • [7] Optimization of Access Control Policies
    Kern, Sascha
    Baumer, Thomas
    Groll, Sebastian
    Fuchs, Ludwig
    Pernul, Guenther
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [8] On access control, data integration, and their languages
    Abadi, M
    COMPUTER SYSTEMS: THEORY, TECHNOLOGY AND APPLICATIONS: A TRIBUTE TO ROGER NEEDHAM, 2004, : 9 - 14
  • [9] A Comparative Study of Access Control Languages
    Pinagapani, Sathish
    Xu, Dianxiang
    Kong, Jun
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 407 - 412
  • [10] Field access analysis for enforcing access control policies
    Lehmann, Kathrin
    Thiemann, Peter
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 337 - 351