2018
DOI: 10.1007/978-3-319-98938-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Efficiently Characterizing the Undefined Requests of a Rule-Based System

Abstract: Rule-based systems are used to define complex policies in several contexts, because of the flexibility and modularity they provide. This is especially critical for security systems, which may require to compose evolving policies for privacy, accountability, access control, etc. The inclusion of conflicting rules in complex policies, results in the inability of the system to unambiguously answer to certain requests, with possibly unpredictable effects. The static identification of these undefined requests is pa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(7 citation statements)
references
References 26 publications
(37 reference statements)
0
7
0
Order By: Relevance
“…And ( Nurse (T , X ) , Not ( Doctor (T , X )) , Patient (T , X ) , Not ( PrimaryDoctor (T , X ))) = > And ( Patie ntWithTP C (T , X ) , Employee (T , X )) ... another 9 not unsafe exclusive rules Applying the method given in [2] on the example shown in Listing 1.1, a total of 4 unsafe and 10 not unsafe exclusive rules are generated. Listing 1.2 shows a snippet of these rules.…”
Section: Listing 12 the Roles Module Analysismentioning
confidence: 99%
See 4 more Smart Citations
“…And ( Nurse (T , X ) , Not ( Doctor (T , X )) , Patient (T , X ) , Not ( PrimaryDoctor (T , X ))) = > And ( Patie ntWithTP C (T , X ) , Employee (T , X )) ... another 9 not unsafe exclusive rules Applying the method given in [2] on the example shown in Listing 1.1, a total of 4 unsafe and 10 not unsafe exclusive rules are generated. Listing 1.2 shows a snippet of these rules.…”
Section: Listing 12 the Roles Module Analysismentioning
confidence: 99%
“…Analyzing inconsistent and conflicting situations in security policies is an important area of research and many proposals exist. Several approaches are focused on detecting specific kinds of problems [7,9,11,10,2], while others are interested in fixing these problems [8,5,14,6,12]. We consider inconsistencies, or conflicts, or undefined requests, called problems here, as they lead to bugs or security leaks.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations