Proceedings of the 16th ACM Symposium on Access Control Models and Technologies 2011
DOI: 10.1145/1998441.1998472
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly discovery and resolution in web access control policies

Abstract: The advent of emerging technologies such as Web services, serviceoriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services while providing more convenient services to Internet users through such a cutting-edge technological growth. Furthermore, designing and managing Web access control policies are often error-prone due to the lack of effective a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
39
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(39 citation statements)
references
References 26 publications
(54 reference statements)
0
39
0
Order By: Relevance
“…In order to validate the feasibility of our approach, a proof-of-concept prototype implementation has been developed under the Eclipse environment 6 by using Model-driven tools and techniques. Concretely, our implementation is based on two features:…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to validate the feasibility of our approach, a proof-of-concept prototype implementation has been developed under the Eclipse environment 6 by using Model-driven tools and techniques. Concretely, our implementation is based on two features:…”
Section: Methodsmentioning
confidence: 99%
“…The following model-to-model transformation have been created: 1) A model transformation for each component model to a XACML model. 2) A library of helpers, an ATL mechanism to factorize OCL operations, representing the basic operations in section 6 3) A model transformation for the integration algorithm in 1. 4) A model query for the detection of anomalies, following the algorithm 2.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…In future work, we are planning to determine the comprehensive privacy conflict resolution approach [21], [22]and to probe the services of collaborative management of shared data in OSN's.We would study inference-based techniques [20] for automatically configure privacy preferences in the AC2P Protocol. Besides, we plan to systematically integrate the notion of trust and reputation into Decision making model and investigate a comprehensive solution to cope with collusion attacks for providing a robust Decision making service in OSNs.…”
Section: Future Workmentioning
confidence: 99%
“…In [8] an innovative policy anomaly analysis approach for web control policy is proposed, here policy based segmentation technique is used into order to accurately identify policy anomalies.…”
Section: Related Workmentioning
confidence: 99%