Proceedings of the 12th ACM Symposium on Access Control Models and Technologies 2007
DOI: 10.1145/1266840.1266842
|View full text |Cite
|
Sign up to set email alerts
|

An approach to evaluate policy similarity

Abstract: Recent collaborative applications and enterprises very often need to efficiently integrate their access control policies. An important step in policy integration is to analyze the similarity of policies. Existing approaches to policy similarity analysis are mainly based on logical reasoning and boolean function comparison. Such approaches are computationally expensive and do not scale well for large heterogeneous distributed environments (like Grid computing systems). In this paper, we propose a policy similar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
1

Year Published

2009
2009
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 62 publications
(38 citation statements)
references
References 17 publications
0
37
0
1
Order By: Relevance
“…An exception is Al-Shaer et al (2005); however, the approach they present is described specically for rewall policy conict and the performance of the algorithm is not presented. Another exception is the work on policy similarity carried out by Lin et al (2007), who introduce a ltering step to eliminate policies from being considered for further expensive analysis.…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…An exception is Al-Shaer et al (2005); however, the approach they present is described specically for rewall policy conict and the performance of the algorithm is not presented. Another exception is the work on policy similarity carried out by Lin et al (2007), who introduce a ltering step to eliminate policies from being considered for further expensive analysis.…”
Section: Discussionmentioning
confidence: 99%
“…Determining the similarity of policies can aid in the policy conict analysis between policies deployed to dierent management domains, as Lin et al (2007) demonstrate. They propose to use policy similarity algorithms as a fast check to determine how similar two policies are, so that policies can be rapidly eliminated from more extensive policy analysis.…”
Section: Description Logic (Dl) Approachmentioning
confidence: 99%
See 3 more Smart Citations