نتایج جستجو برای: access control policy acp

تعداد نتایج: 1825945  

2009
Tony Bourdier Horatiu Cirstea Pierre-Etienne Moreau Anderson Santana de Oliveira

In this paper we show how access control policies can be specified using term rewriting systems and present the corresponding implementation realized using the Tom framework. We focus on two well known models (BellLapadula and McLean) and propose an algorithm that detects potential information leakages, i.e. checks that information can be accessed only by authorized users independently of the a...

2007
Eunjee Song Indrakshi Ray Hanil Kim

From a software design perspective, access control policies are requirements that must be addressed in a design. For example, access control policies are constraints that determine the type of access authorized users have on information resources. In this paper, we show how one can formulate access control policies as a policy model, formulate an access control aspect model that enforces polici...

2006
Saad Zafar Kirsten Winter Robert Colvin R. G. Dromey

Role-based access control (RBAC) has been acknowledged as an effective mechanism for specifying and enforcing access control policies. However, it is not always clear how an RBAC policy can be systematically integrated into the system design so as to preserve the desired security requirements. In this paper we propose a representation and a process that supports systematic integration of an acc...

2015
Yanjie Zhou Min Wen

We present a novel static approach to Role-Based Access Control policy enforcement. The static approach we advocate includes a novel design methodology, for applications involving RBAC, which integrates the security requirements into the system’s architecture. We apply this novel methodology to policies restricting calls to methods in Java applications. We present a language to express RBAC pol...

Journal: :International Journal of Software Engineering and Knowledge Engineering 2011
Vincent C. Hu D. Richard Kuhn Tao Xie JeeHyun Hwang

Mandatory access control (MAC) mechanisms control which users or processes have access to which resources in a system. MAC policies are increasingly specified to facilitate managing and maintaining access control. However, the correct specification of the policies is a very challenging problem. To formally and precisely capture the security properties that MAC should adhere to, MAC models are u...

2007
Lujo Bauer Lorrie Cranor Robert W. Reeder Michael K. Reiter Kami Vaniea

Significant effort has been invested in developing expressive and flexible access-control languages and systems. However, little work has been done to evaluate these theoretically interesting systems in practical situations with real users, and few attempts have been made to discover and analyze the accesscontrol policies that users actually want to implement. In this paper we report on a study...

1997
D. Richard Kuhn

Role based access control (RBAC) is attracting increasing attention as a security mechanism for both commercial and many military systems. Much of RBAC is fundamentally diierent from multi-level security (MLS) systems, and the properties of RBAC systems have not been explored formally to the extent that MLS system properties have. This paper explores some aspects of mutual exclusion of roles as...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

With the rapid advances in computing and information technologies, traditional access control models have become inadequate terms of capturing fine-grained, expressive security requirements newly emerging applications. An attribute-based (ABAC) model provides a more flexible approach to addressing authorization needs complex dynamic systems. While organizations are interested employing newer mo...

2004
Ricardo Nabhen Edgard Jamhour Carlos Maziero

This paper presents a PCIM-based framework for storing and enforcing RBAC (Role Based Access Control) policies in distributed heterogeneous systems. PCIM (Policy Core Information Model) is an information model proposed by IETF. PCIM permits to represent network policies in a standard form, allowing software from different vendors to read the same set of policy rules. This paper describes a PCIM...

2015
Marc Lobelle Mahouton Norbert Hounkonnou Firmin Donadje Victor Oyetola

This paper presents the way a gigabit NREN (National Research and Education Network) covering the whole country of Benin and that will connect over twenty university centers was built using mainly local unused infrastructures and local permanent staff already paid by the State of Benin (predominantly personnel from the Université d'Abomey-Calavi, UAC, in Benin and from Benin Armed Forces). The ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید