Proceedings of the 11th ACM Conference on Computer and Communications Security 2004
DOI: 10.1145/1030083.1030093
|View full text |Cite
|
Sign up to set email alerts
|

Comparing the expressive power of access control models

Abstract: Comparing the expressive power of access control models is recognized as a fundamental problem in computer security. Such comparisons are generally based on simulations between different access control schemes. However, the definitions for simulations that are used in the literature make it impossible to put results and claims about the expressive power of access control models into a single context. Furthermore, some definitions for simulations used in the literature such as those used for comparing RBAC (Rol… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
77
0

Year Published

2006
2006
2012
2012

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(77 citation statements)
references
References 19 publications
0
77
0
Order By: Relevance
“…In [7], different access control models are represented in C-Datalog (an object-oriented extension of Datalog) and compared using results from logic programming. In [23], the authors express access control systems as state transitions systems as we do and introduce security-preserving mappings, called reductions, to compare security analysis based on accessibility relations in two different models. In [9,15], the comparison mechanism is based on a notion of simulation.…”
Section: Related Workmentioning
confidence: 99%
“…In [7], different access control models are represented in C-Datalog (an object-oriented extension of Datalog) and compared using results from logic programming. In [23], the authors express access control systems as state transitions systems as we do and introduce security-preserving mappings, called reductions, to compare security analysis based on accessibility relations in two different models. In [9,15], the comparison mechanism is based on a notion of simulation.…”
Section: Related Workmentioning
confidence: 99%
“…These simulation frameworks proved to be too relaxed, allowing almost any reasonable scheme to be shown equivalent to all others. To address this, Tripunitara and Li [25] developed a more restrictive notion of expressive power. Their framework supersedes the more informal notions of simulation developed in prior works by requiring the use of specific types of mappings between systems that guarantee relevant security properties are preserved under simulation; this provides a greater level of precision when ranking access control schemes in terms of their expressiveness.…”
Section: Related Workmentioning
confidence: 99%
“…However, existing work on the formal analysis of access control schemes has focused largely on comparing the relative expressive power of two or more access control schemes (e.g., [1,7,11,17,20,21,23,25]). Although expressive Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page.…”
Section: Introductionmentioning
confidence: 99%
“…An access control policy is a definition of how a system should provide or deny access which can range from an abstract statement like, "only users on this list should have access," or "only users who have given me service in the past should have access," to programs in policy languages with executable semantics. An access control scheme, as defined by [14], is a state transition system in which access control decisions are specified as changes of state in an appropriate representation such as an access control matrix. A set of access control schemes is an access control model.…”
Section: 1mentioning
confidence: 99%