CONTROL POLICY MANAGEMENT A Dissertation
نویسندگان
چکیده
Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, we design a new language for policy specification, propose a new type of access control policy, and study the computational complexity of a variety of policy analysis problems. In particular, • We design a novel algebra that enables the specification of high-level security policies that combine qualification requirements with quantity requirements. Our algebra contains six operators and is expressive enough to specify many natural high-level security policies. We study the properties of the algebra, as well as several computational problems related to the algebra. • Traditional access control policy analysis focuses on restricting access. However, an equally important aspect of access control is to enable access. With this in mind, we introduce the notion of resiliency policies for access control systems. We formally define resiliency policies and study computational problems on checking whether an access control state satisfies a resiliency policy. We also study the consistency between resiliency policies and separation of duty policies. • The workflow authorization system is a popular access control model. We study fundamental problems related to policy analysis in workflow authorization systems, such as determining whether a set of users can complete a workflow in a certain access control state. In particular, we apply tools from parameterized complexity
منابع مشابه
A look at phenomenon of dissertation ghost writing in Iran: Policies and the condition of possibility
The phenomenon of the theses and dissertation ghost writing is based on a number of conditions, overlapping procedures, conjuncture of policies and all kinds of policies, legislation, and practices in the academic institution. In this study, first, the growth trend of universities and academic institutions in the last two decades and then, the transformation in the policy of promoting professor...
متن کاملTitle of dissertation : SECURE , POLICY - BASED , MULTI - RECIPIENT DATA SHARING Rakesh Babu Bobba Doctor of Philosophy , 2009
Title of dissertation: SECURE, POLICY-BASED, MULTIRECIPIENT DATA SHARING Rakesh Babu Bobba Doctor of Philosophy, 2009 Dissertation directed by: Professor Virgil D. Gligor Department of Electrical and Computer Engineering In distributed systems users often need to share sensitive data with other users based on the latter’s ability to satisfy various policies. In many cases the data owner may not...
متن کاملAbstract of a Dissertation Can Community-based Natural Resource Management Improve Wildfire Policy Planning in Interior Alaska? Addressing Value Differences, Ineffective Participatory Processes, and Conflicts over Traditional Ecological Knowledge Lily
OF A DISSERTATION CAN COMMUNITY-BASED NATURAL RESOURCE MANAGEMENT IMPROVE WILDFIRE POLICY PLANNING IN INTERIOR ALASKA? ADDRESSING VALUE DIFFERENCES, INEFFECTIVE PARTICIPATORY PROCESSES, AND CONFLICTS OVER TRADITIONAL ECOLOGICAL KNOWLEDGE
متن کاملAccess Control Policy Management
Wang, Qihua. Ph.D., Purdue University, May 2009. Access Control Policy Management. Major Professor: Ninghui Li. Access control is the traditional center of gravity of computer security [1]. People specify access control policies to control accesses to resources in computer systems. The management of access control policies include policy specification and policy analysis. In this dissertation, ...
متن کاملAn access control framework for security policies with complex constraints
Most of current access control systems are not expressive enough for current applications, in the sense that they cannot express several access control policies required by them. Most of these applications have no choice but to build their owned very specific access control systems completely independently from other applications running on the same environment, which entails potential incohere...
متن کامل