2007
DOI: 10.1016/j.entcs.2007.01.064
|View full text |Cite
|
Sign up to set email alerts
|

High Level Conflict Management Strategies in Advanced Access Control Models

Abstract: Specifying a security policy that includes both permissions and prohibitions, may lead to conflicts. This corresponds to a situation where a subject is both permitted and prohibited to perform a given action on a given object. We adopt a comparative approach to investigate this problem. We first investigate access control models based on rules, called Rule-BAC, and present weaknesses that arise when we try to manage conflicts in this model. In particular, Rule-BAC models fail to provide decidable solution to r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
59
0

Year Published

2007
2007
2022
2022

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 87 publications
(59 citation statements)
references
References 13 publications
(24 reference statements)
0
59
0
Order By: Relevance
“…In the OrBAC model, concrete security policy rules are derived automatically Derivation in the OrBAC model is computable in polynomial time. 19 …”
Section: Kaosmentioning
confidence: 99%
See 2 more Smart Citations
“…In the OrBAC model, concrete security policy rules are derived automatically Derivation in the OrBAC model is computable in polynomial time. 19 …”
Section: Kaosmentioning
confidence: 99%
“…To ease the policy designer's work, we anticipate the resolution of conflicts generated by such exception rules. For this purpose and as suggested in, 19 conflicts are solved by assigning priorities to security rules. Thus, exception rules are always associated with higher priority than other security rules (including the non derivable rules).…”
Section: Underivability and Exceptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, only access control and obligations are supported. However, it is straightforward to add support for more advanced features such as delegation [20] and more advanced conflict detection and resolution strategies [21].…”
Section: B Policy Decision Pointmentioning
confidence: 99%
“…We assume that this issue has been checked. There are several techniques to achieve this goal (see for instance [7]). …”
Section: Introductionmentioning
confidence: 99%