Access control policies and languages

被引:0
|
作者
di Vimercati, Sabrina De Capitani [1 ]
Foresti, Sara [1 ]
Samarati, Pierangela [1 ]
Jajodia, Sushil [2 ,3 ]
机构
[1] Univ Milan, DTI, I-26013 Crema, Italy
[2] George Mason Univ, Informat Technol, Fairfax, VA 22030 USA
[3] George Mason Univ, Ctr Secure Informat Syst, Fairfax, VA 22030 USA
关键词
authorisation hierarchies; positive and negative authorisations; attribute-based access control;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and illustrate the main characteristics of access control solutions.
引用
收藏
页码:94 / 102
页数:9
相关论文
共 50 条
  • [41] Specification of access control policies for web services
    Liu, Miao
    Zhang, Wei
    Liu, Huai-Liang
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 472 - 475
  • [42] Rewriting-Based Access Control Policies
    de Oliveira, Anderson Santana
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 171 (04) : 59 - 72
  • [43] Automatically Reducing Privilege for Access Control Policies
    D'Antoni, Loris
    Ding, Shuo
    Goel, Amit
    Ramesh, Mathangi
    Rungta, Neha
    Sung, Chungha
    Proceedings of the ACM on Programming Languages, 2024, 8 (OOPSLA2)
  • [44] Rewrite Based Specification of Access Control Policies
    Cirstea, Horatiu
    Moreau, Pierre-Etienne
    de Oliveira, Anderson Santana
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 234 (0C) : 37 - 54
  • [45] Negotiation of access control policies - (Transcript of discussion)
    Gligor, VD
    SECURITY PROTOCOLS, 2002, 2467 : 202 - 212
  • [46] Signature and access control policies for XML documents
    Bertino, E
    Ferrari, E
    Provenza, LP
    COMPUTER SECURITY - ESORICS 2003, PROCEEDINGS, 2003, 2808 : 1 - 22
  • [47] Detecting Inconsistency and Incompleteness in Access Control Policies
    Zhang, Hongbin
    Ma, Pengcheng
    Wang, Meihua
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 731 - 739
  • [48] Representing Access Control Policies in Use Cases
    Alghathbar, Khaled
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2012, 9 (03) : 268 - 275
  • [49] On the Decidability of the Safety Problem for Access Control Policies
    Kleiner, E.
    Newcomb, T.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 185 : 107 - 120
  • [50] Extending Mandatory Access Control Policies in Android
    Paraboschi, Stefano
    Bacis, Enrico
    Mutti, Simone
    INFORMATION SYSTEMS SECURITY, (ICISS 2015), 2015, 9478 : 21 - 35