Access Control Policy: A Framework to Enforce Recommendations
نویسندگان
چکیده
Access control policies are generally modelled using permission, prohibition, and obligation rules. However, this does not cover all possible scenarios as several applications have recommendation rules. In this paper, we provide a formal framework to express and to enforce recommendations. More precisely, our framework allows to express recommendation rules that become requirements over time. Furthermore, we give the specification of the policy controller behavior in charge of evaluating such a policy. Basically, in our formalization, a recommendation is asso ciated with three conditions. The first one triggers the recommendation: when this condition is true, a notification is sent to the user to carry out an action satisfying the recommendation. The second condition is the recall deadline that determines when the next notification will be sent if the user has not perform the access satifying the recommendation. The third condition determines when a recommendation could become a requirement. Keywords— Information systems security, access control policy, temporary logic of actions
منابع مشابه
An access control framework for security policies with complex constraints
Most of current access control systems are not expressive enough for current applications, in the sense that they cannot express several access control policies required by them. Most of these applications have no choice but to build their owned very specific access control systems completely independently from other applications running on the same environment, which entails potential incohere...
متن کاملA centralized privacy-preserving framework for online social networks
There are some critical privacy concerns in the current online social networks (OSNs). Users' information is disclosed to different entities that they were not supposed to access. Furthermore, the notion of friendship is inadequate in OSNs since the degree of social relationships between users dynamically changes over the time. Additionally, users may define similar privacy settings for their f...
متن کاملUsable Global Network Access Policy for PCS
With the nation’s increasing awareness of the importance of securing the computer/communication infrastructure of process control systems (PCS), recommendations for their configuration have appeared, most notably NIST Special Publication SP-800-82 [1]. Some of these recommendations concern network connectivity, specifically describing near isolation of some subnetworks from the PCS. Security me...
متن کاملTaylor Rule: A Model for the Mechanism of Monetary Policy and Inflation Control in the Framework of the Interest-Free Banking Act
The ultimate goal of monetary policy is to achieve price stability and high output. In this regard, central banks usually change the interest rate, liquidity, and money base in order to apply monetary policies. The John B. Taylor rule is one of the rules known in the transmission of monetary policy.[1] Based on this rule and given the output gap and inflation gap, the central bank increases or ...
متن کاملInterleaving Semantic Web Reasoning and Service Discovery to Enforce Context-Sensitive Security and Privacy Policies
Enforcing rich policies in open environments will increasingly require the ability to dynamically identify external sources of information necessary to enforce different policies (e.g. finding an appropriate source of location information to enforce a location-sensitive access control policy). In this paper, we introduce a semantic web framework and a metra-control model for dynamically interle...
متن کامل