Constraint systems provide techniques for automatically analyzing the conformance of low-level access control policies to high-level business rules formalized as logical constraints. However, there are likely to be priorities for solutions that are not easy to encode formally, so administrator input is often important. This paper introduces PolicyMorph, a constraint system that supports interactive development and maintenance of access control policies that respect both formalized and un-formalized business rules and priorities. We provide a mathematical description of the system and an architecture for implementing it. We constructed a prototype that is validated using a case study in which constraints are imposed on a building automation ...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Organizations typically define policies to describe (positive or negative) requirements about strate...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Access control systems are widely used means for the protection of computing systems. They are defin...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
A major drawback of existing access control systems is that they have all been developed with a spec...
Simplifying the administration of location-based access-control policies requires a mechanism that s...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
In this paper, we propose a logic based approach to specify and to reason about transformation of au...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
Despite considerable advancements in the area of access control and authorization languages, current...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Organizations typically define policies to describe (positive or negative) requirements about strate...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Access control systems are widely used means for the protection of computing systems. They are defin...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
A major drawback of existing access control systems is that they have all been developed with a spec...
Simplifying the administration of location-based access-control policies requires a mechanism that s...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
PolicyUpdater is a fully-implemented authorisation system that provides policy evaluations as well a...
Abstract. Many languages and algebras have been proposed in recent years for the specification of au...
In this paper, we propose a logic based approach to specify and to reason about transformation of au...
Despite considerable advancements in the area of access control and authorization languages, cur-ren...
Despite considerable advancements in the area of access control and authorization languages, current...
Many languages and algebras have been proposed in recent years for the specification of authorizatio...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
Organizations typically define policies to describe (positive or negative) requirements about strate...