2009
DOI: 10.1007/978-3-642-01187-0_17
|View full text |Cite
|
Sign up to set email alerts
|

Typing for Conflict Detection in Access Control Policies

Abstract: Abstract. In this paper we present an access control model that considers both abstract and concrete access control policies specifications. Permissions and prohibitions are expressed within this model with contextual conditions. This situation may lead to conflicts. We propose a type system that is applied to the different rules in order to check for inconsistencies. If a resource is well typed, it is guaranteed that access rules to the resource contain no conflicts.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…Although obvious instances of such conflicts are probably rare, hidden conflicts can arise by means of the mechanisms provided by the model. In [2], a typing system is presented to detect inconsistencies between permissions and prohibitions within security policies that are expressed using a CABAC formalism simpler than the one we present in this paper. Propositions for solving conflicts in access control policies were also presented in [3,[6][7][8]12].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although obvious instances of such conflicts are probably rare, hidden conflicts can arise by means of the mechanisms provided by the model. In [2], a typing system is presented to detect inconsistencies between permissions and prohibitions within security policies that are expressed using a CABAC formalism simpler than the one we present in this paper. Propositions for solving conflicts in access control policies were also presented in [3,[6][7][8]12].…”
Section: Resultsmentioning
confidence: 99%
“…These inconsistencies should be detected and then resolved. We have already discussed a method to detect similar anomalies using typing systems [2]. However, this method is limited to permissions and prohibitions.…”
Section: Emergency_record Salar Y_record} 2 )mentioning
confidence: 99%
“…Several works [29,1,22,12,11,8,20] have proposed techniques to detect inconsistencies and redundancies in XACML or extensions of RBAC policies by leveraging a variety of verification engines. None of these works provides decidability and complexity results of the analysis techniques as we do in this paper.…”
Section: Related Work and Discussionmentioning
confidence: 99%
“…Existing research work has mainly focused on the detection of inconsistencies in access control policies [3], [4], [5], [6], [7], [8]. However, less importance has been given to resolving the completeness problem.…”
Section: Introductionmentioning
confidence: 98%