Models of Access Control Policies specified with graphs and graph transformation rules combine an intuitive visual representation with solid semantical foundations. While the expressive power of graph transformations leads in general to undecidable models, we prove that it is possible, with reasonable restrictions on the form of the rules, to obtain access control models where safety is decidable. The restrictions introduced are minimal in that no deletion and addition of a graph structure are allowed in the same modification step. We then illustrate our result with two examples: a graph based DAC model and a simplified decentralized RBAC model
Role-Based Access Control (RBAC) is supported directly or in a closely related form, by a number of ...
We analyze the safety question for the Non-Monotonic Transform (NMT) model, an access control model ...
International audienceThis paper is concerned with the interplay of the expressiveness of model and ...
Models of Access Control Policies specified with graphs and graph transformation rules combine an in...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Abstract: Protecting computational resources and digital information against unau-thorized access is...
Computer systems contain vital information that must be protected. One of the crucial aspects of pro...
An apparently prevailing myth is that safety is unde-cidable in Discretionary Access Control (DAC); ...
We study decidability issues for reachability problems in graph transformation systems, a powerful i...
A uniform and precise framework for the specification of access control policies is proposed. The un...
Role-Based Access Control (RBAC) is supported directly or in a closely related form, by a number of ...
We analyze the safety question for the Non-Monotonic Transform (NMT) model, an access control model ...
International audienceThis paper is concerned with the interplay of the expressiveness of model and ...
Models of Access Control Policies specified with graphs and graph transformation rules combine an in...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
AbstractAn access control system regulates the rights of users to gain access to resources in accord...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Abstract: Protecting computational resources and digital information against unau-thorized access is...
Computer systems contain vital information that must be protected. One of the crucial aspects of pro...
An apparently prevailing myth is that safety is unde-cidable in Discretionary Access Control (DAC); ...
We study decidability issues for reachability problems in graph transformation systems, a powerful i...
A uniform and precise framework for the specification of access control policies is proposed. The un...
Role-Based Access Control (RBAC) is supported directly or in a closely related form, by a number of ...
We analyze the safety question for the Non-Monotonic Transform (NMT) model, an access control model ...
International audienceThis paper is concerned with the interplay of the expressiveness of model and ...