Access control policies and languages

被引:0
|
作者
di Vimercati, Sabrina De Capitani [1 ]
Foresti, Sara [1 ]
Samarati, Pierangela [1 ]
Jajodia, Sushil [2 ,3 ]
机构
[1] Univ Milan, DTI, I-26013 Crema, Italy
[2] George Mason Univ, Informat Technol, Fairfax, VA 22030 USA
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
authorisation hierarchies; positive and negative authorisations; attribute-based access control;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.
引用
收藏
页码:94 / 102
页数:9
相关论文
共 50 条
  • [21] Towards Composing Access Control Policies
    Shahzad, Muhammad
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [22] Dynamic adaptation of access control policies
    Bharadwaj, V
    Baras, J
    MILCOM 2003 - 2003 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2003, : 761 - 766
  • [23] Stratified Abstraction of Access Control Policies
    Backes, John
    Berrueco, Ulises
    Bray, Tyler
    Brim, Daniel
    Cook, Byron
    Gacek, Andrew
    Jhala, Ranjit
    Luckow, Kasper
    McLaughlin, Sean
    Menon, Madhav
    Peebles, Daniel
    Pugalia, Ujjwal
    Rungta, Neha
    Schlesinger, Cole
    Schodde, Adam
    Tanuku, Anvesh
    Varming, Carsten
    Viswanathan, Deepa
    COMPUTER AIDED VERIFICATION (CAV 2020), PT I, 2020, 12224 : 165 - 176
  • [24] The Challenge of Access Control Policies Quality
    Bertino, Elisa
    Abu Jabal, Amani
    Calo, Seraphin
    Verma, Dinesh
    Williams, Christopher
    ACM JOURNAL OF DATA AND INFORMATION QUALITY, 2018, 10 (02):
  • [25] Verification and enforcement of access control policies
    Cau, Antonio
    Janicke, Helge
    Moszkowski, Ben
    FORMAL METHODS IN SYSTEM DESIGN, 2013, 43 (03) : 450 - 492
  • [26] Management of exceptions on access control policies
    Alfaro, J. G.
    Cuppens, F.
    Cuppens-Boulahia, N.
    NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 97 - +
  • [27] An attribute graph based approach to map local access control policies to credential based access control policies
    Warner, J
    Atluri, V
    Mukkamala, R
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2005, 3803 : 134 - 147
  • [28] An Obligation Model Bridging Access Control Policies and Privacy Policies
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 133 - 142
  • [29] Governance policies for privacy access control and their interactions
    Hassan, W
    Logrippo, L
    FEATURE INTERACTIONS IN TELECOMMUNICATIONS AND SOFTWARE SYSTEMS VIII, 2005, : 114 - 130
  • [30] Typing for Conflict Detection in Access Control Policies
    Adi, Kamel
    Bouzida, Yacine
    Hattak, Ikhlass
    Logrippo, Luigi
    Mankovskii, Serge
    E-TECHNOLOGIES-INNOVATION IN AN OPEN WORLD, 2009, 26 : 212 - +