2015
DOI: 10.1016/j.entcs.2015.04.006
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for the Analysis of Access Control Policies with Emergency Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(21 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…1 The pipeline of operations at the basis of an enforcement mechanism leveraging on the unifying data model Lin et al (2010) as a basis for reasoning on the permissions granted by access control policies. Graph-based analysis approaches for category based access control policies have been proposed in Alves and Fernández (2015), with the aim to ease verification tasks of security administrators. Finally, data mining techniques have been primarily used for the detecting policy anomalies (e.g., ).…”
Section: Policy Analysis Toolsmentioning
confidence: 99%
“…1 The pipeline of operations at the basis of an enforcement mechanism leveraging on the unifying data model Lin et al (2010) as a basis for reasoning on the permissions granted by access control policies. Graph-based analysis approaches for category based access control policies have been proposed in Alves and Fernández (2015), with the aim to ease verification tasks of security administrators. Finally, data mining techniques have been primarily used for the detecting policy anomalies (e.g., ).…”
Section: Policy Analysis Toolsmentioning
confidence: 99%
“…Coal enterprises prone to emergent events whose influence is relatively large range and destruction is more serious [5][6][7]. The urgent need for coal enterprises is to enhance emergency capability to respond to emergent events, so it is more important to analyze the current situation of emergency capability [8,9].…”
Section: Instructionmentioning
confidence: 99%
“…Graphbased languages have been used in the literature to model and analyse access control problems, but not within CBAC (with the exception of [3], which is the basis for this paper and considers CBAC policies without prohibitions). Koch et al [38,39], inspired by the role-permission assignment model proposed by Nyanchama and Osborn [46], use directed graphs to formalise RBAC, using a graph model similar to Baldwin's privilege graphs [8].…”
Section: Related Workmentioning
confidence: 99%
“…We also annotate edge types CA with the same possible values {A, B}, and divide edges of type CA into two sets CA A and CA B , corresponding to edges representing authorisations and prohibitions, respectively. Edges are no longer uniquely identified by their adjacent nodes, but rather by adj and auth (unless auth is undefined for a particular edge) 3 .…”
Section: Representing Static Cbac Policies With Prohibitionsmentioning
confidence: 99%
See 1 more Smart Citation