2012
DOI: 10.1007/978-3-642-31540-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Automated and Efficient Analysis of Role-Based Access Control with Attributes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 27 publications
(44 reference statements)
0
8
0
Order By: Relevance
“…This can no more be done when the hierarchy is time-dependent, rising a new challenge for our safety analysis technique. As a final remark, we would like to point out the problem of finding adequate benchmark sets that we have faced several times in our efforts for this paper and previous works [3,1,5,4,20,19] for the design of safety analysis techniques in access control. As in many other papers in the literature (see, e.g., [24,13,9]), the evaluation is based on benchmarks derived from synthetic policies.…”
Section: Discussionmentioning
confidence: 97%
“…This can no more be done when the hierarchy is time-dependent, rising a new challenge for our safety analysis technique. As a final remark, we would like to point out the problem of finding adequate benchmark sets that we have faced several times in our efforts for this paper and previous works [3,1,5,4,20,19] for the design of safety analysis techniques in access control. As in many other papers in the literature (see, e.g., [24,13,9]), the evaluation is based on benchmarks derived from synthetic policies.…”
Section: Discussionmentioning
confidence: 97%
“…Although the parameters of role can be considered as user attributes, all parameters are treated as atomicvalued and are only changed together with the modification of role. Similar works are [3,4] which presented symbolic analysis for attribute RBAC models. Our work is fundamentally different from these in consideration of administration of multiple attributes including atomic valued attributes, whereas the ARBAC97 analysis only deals with a single set-valued attribute called role.…”
Section: Related Workmentioning
confidence: 93%
“…SMT and SAT solvers are commonly used in policies analysis. Authors in [36,37] present analysis techniques based on SMT solvers for analyzing XACML and variant of RBAC policies. Abductive reasoning solutions were also proposed to reason out policies conflicts and gaps.…”
Section: Verification and Validation Of Access Control Policiesmentioning
confidence: 99%