Traditional policies often focus on access control requirement and there have been several proposals to define access control policy algebras to handle their compositions. Recently, obligations are increasingly being expressed as part of security policies. However, the compositions and interactions between these two have not yet been studied adequately. In this paper, we propose an algebra capturing both authorization and obligation policies. The algebra consists of two policy constants and six basic operations. It provides language independent mechanisms to manage policies. As a concrete example, we instantiate the algebra for the Ponder2 policy language
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
A major drawback of existing access control systems is that they have all been developed with a spec...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Abstract—Traditional policies often focus on access control re-quirement and there have been several...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
Security-sensitive environments protect their information resources against unauthorized use by enfo...
Despite considerable advancements in the area of access control and authorization languages, current...
Access control is the traditional center of gravity of computer security [1]. People specify access ...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computin...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
A major drawback of existing access control systems is that they have all been developed with a spec...
Abstract. Many frameworks for defining authorization policies fail to make a clear distinction betwe...
Security services in a multi-user environment are often based on access control mechanisms. Static a...
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared...