2009
DOI: 10.1147/jrd.2009.5429045
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of privacy and security policies

Abstract: Policy analysis techniques have usually been developed independently of applications or they have been tailored to policies with specific purposes, e.g. they have been used to analyze access control policies, system management policies or privacy policies. There are analysis techniques to detect redundancy and incompleteness of policies. There are also techniques to detect modality conflicts such as obligations that cannot be fulfilled because of the lack of authorizations, and techniques to detect circular de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0
1

Year Published

2016
2016
2018
2018

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 29 publications
(39 reference statements)
0
9
0
1
Order By: Relevance
“…The axiom (a1), and its algebraic version (a1 ), state that a request by a principal p to perform the action a on a resource r is authorised only if p belongs to a category c such that for some category below c (e.g., c itself) the action a is authorised on r, otherwise the request is denied following the wellknown negative closed world assumption [14]. However, many systems permit the definition of positive and negative authorisations (or authorisations and prohibitions).…”
Section: Preliminaries: Category-based Access Control Policiesmentioning
confidence: 99%
See 4 more Smart Citations
“…The axiom (a1), and its algebraic version (a1 ), state that a request by a principal p to perform the action a on a resource r is authorised only if p belongs to a category c such that for some category below c (e.g., c itself) the action a is authorised on r, otherwise the request is denied following the wellknown negative closed world assumption [14]. However, many systems permit the definition of positive and negative authorisations (or authorisations and prohibitions).…”
Section: Preliminaries: Category-based Access Control Policiesmentioning
confidence: 99%
“…This motivated the work on distributed and federative access control models, and the development of tools and technologies to manage the policies (see, e.g., [14] for a survey of analysis techniques). Security administrators need to query policies to extract information and to verify basic correctness properties.…”
Section: Analysis Of Category-based Policiesmentioning
confidence: 99%
See 3 more Smart Citations