2011
DOI: 10.1007/978-3-642-24559-6_17
|View full text |Cite
|
Sign up to set email alerts
|

Conformance Checking of Dynamic Access Control Policies

Abstract: Abstract. The capture, deployment and enforcement of appropriate access control policies are crucial aspects of many modern software-based systems. Previously, there has been a significant amount of research undertaken with respect to the formal modelling and analysis of access control policies; however, only a limited proportion of this work has been concerned with dynamic policies. In this paper we explore techniques for the modelling, analysis and subsequent deployment of such policies-which may rely on ext… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
2
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Since policy constraints can be modeled using the Alloy language, several frameworks for policy analysis use Alloy as underlying building block [94,96,115,149,182,193].…”
Section: Alloymentioning
confidence: 99%
“…Since policy constraints can be modeled using the Alloy language, several frameworks for policy analysis use Alloy as underlying building block [94,96,115,149,182,193].…”
Section: Alloymentioning
confidence: 99%
“…Sybildefender [32], SybilInfer [11] and Sybilguard [33] focus on identifying sybil WBSN nodes. In addition, [26] works with policies that involve users' actions but they are applied for dynamic access control instead of provenance management.…”
Section: Related Workmentioning
confidence: 99%
“…The policies in ABAC expresses a complex Boolean rule set capable of evaluating many different attributes. The RBACbased model (Power et al, 2011) captures the disparities of access control policies relying on specific constraint-checks to administer interoperability. With the advent of mobile-based (Rodrigues et al, 2013a) and cloud-based solutions (Fernández-Cardeñosa et al, 2012), access to EHR is not limited to closed environments.…”
Section: Related Workmentioning
confidence: 99%