Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an intuitive visual framework with a rigorous semantical foundation. A security policy framework specifies a set of (constructive) rules to build the system states and sets of positive and negative (declarative) constraints to specify wanted and unwanted substates. Models for AC (e.g. role-based, lattice-based or an access control list) have been specified in this framework elsewhere. Here we address the problem of inconsistent policies within this framework. Using formal properties of graph transformations, we can systematically detect inconsistencies between constraints, between rules and between a rule and a constraint and lay the foundation f...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
This article discusses potential clashes between different types of security policies that regulate ...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
A uniform and precise framework for the specification of access control policies is proposed. The un...
Abstract. In this paper we present an access control model that con-siders both abstract and concret...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Abstract — Access control requires authorization rules and constraints. To express access control po...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
The emergence of technologies such as service-oriented architectures and cloud computing has allowed...
Authorization delegations and negations are two important features of a flexible access control mode...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
This article discusses potential clashes between different types of security policies that regulate ...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
A uniform and precise framework for the specification of access control policies is proposed. The un...
Abstract. In this paper we present an access control model that con-siders both abstract and concret...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Abstract — Access control requires authorization rules and constraints. To express access control po...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
The emergence of technologies such as service-oriented architectures and cloud computing has allowed...
Authorization delegations and negations are two important features of a flexible access control mode...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
Graph-based approach to access control models have been studied by researchers due to its visualizat...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
The problem of resolving conflicts in delegated authorizations has not been systematically addressed...
This article discusses potential clashes between different types of security policies that regulate ...