2007
DOI: 10.1007/s10207-007-0017-y
|View full text |Cite
|
Sign up to set email alerts
|

Audit-based compliance control

Abstract: In this paper we introduce a new framework for controlling compliance to discretionary access control policies [Cederquist et al. in work. We derive an important tractability result (a cutelimination theorem), and we use this result to implement a proof-finder, a key component in this framework. We argue that in a number of settings, such as collaborative work environments, where a small group of users create and manage document in a decentralized way, our framework is a more flexible approach for controlling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
48
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 67 publications
(48 citation statements)
references
References 34 publications
0
48
0
Order By: Relevance
“…The resulting diagnostics of these techniques have been applied in various context. For example, it is used to assess the quality of a model with respect to the reality [10], to repair or simplify models based on diagnosed deviations [11,5], to perform auditing and compliance analysis [12,3,2], to find decision points in processes [13], to conduct root cause analysis [14] and performance analysis [4].…”
Section: Resultsmentioning
confidence: 99%
“…The resulting diagnostics of these techniques have been applied in various context. For example, it is used to assess the quality of a model with respect to the reality [10], to repair or simplify models based on diagnosed deviations [11,5], to perform auditing and compliance analysis [12,3,2], to find decision points in processes [13], to conduct root cause analysis [14] and performance analysis [4].…”
Section: Resultsmentioning
confidence: 99%
“…First Order Logic (FOL) Logics have been used in several well-developed auditing systems [24,10], for the encoding of both audit logs and queries. FOL in particular is attractive due to readily available implementation support, e.g.…”
Section: Support For Various Approachesmentioning
confidence: 99%
“…There are many examples of where and how this could be achieved, from a posteriori access control [13] to blacklisting in online auction sites, or from our own example of the parable above taken through Alice's agent's eyes, through advanced Trust Management system techniques that ensure accountability.…”
Section: Regret Managementmentioning
confidence: 99%