Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources, access control policies regulating their manipulation need to be compared, contrasted, and composed. An algebra for manipulating such access control policies at a higher (propositional) level, where the operations of the algebra are abstracted from their specification details, is the subject of this paper. This algebra is applicable to policies that have controlled nondeterminism and all or nothing assignments of access privileges in their specification. These requirements reflect current p...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
A major drawback of existing access control systems is that they have all been developed with a spec...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Traditional policies often focus on access control requirement and there have been several proposals...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Abstract. Making correct access-control decisions is central to security, which in turn requires acc...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
A major drawback of existing access control systems is that they have all been developed with a spec...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Traditional policies often focus on access control requirement and there have been several proposals...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Abstract. Making correct access-control decisions is central to security, which in turn requires acc...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
A major drawback of existing access control systems is that they have all been developed with a spec...