2014
DOI: 10.1109/tdsc.2013.42
|View full text |Cite
|
Sign up to set email alerts
|

Abductive Analysis of Administrative Policies in Rule-Based Access Control

Abstract: In large organizations, access control policies are managed by multiple users (administrators). An administrative policy specifies how each user in an enterprise may change the policy. Fully understanding the consequences of an administrative policy in an enterprise system can be difficult, because of the scale and complexity of the access control policy and the administrative policy, and because sequences of changes by different users may interact in unexpected ways. Administrative policy analysis helps by an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…A third direction for future work is to develop policy analysis algorithms, to help policy developers understand the full implications of proposed administrative policies. We plan to explore an abductive policy analysis for RPPM 2 along the lines of Gupta, Stoller, and Xu's abductive policy analysis for ACAR [9,10].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…A third direction for future work is to develop policy analysis algorithms, to help policy developers understand the full implications of proposed administrative policies. We plan to explore an abductive policy analysis for RPPM 2 along the lines of Gupta, Stoller, and Xu's abductive policy analysis for ACAR [9,10].…”
Section: Resultsmentioning
confidence: 99%
“…It is based partly on the sample policy in [9,10]. The permissible relationship graph appears in Figure 1.…”
Section: Example: Healthcare Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many studies that have applied the situation-based access control, rule/role-based access control, and situation recognition-based access control as representative security technologies of medical information systems [8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Administrators are responsible for providing administrative services such as system maintenance and user support. Permissions to specific data are performed by granular control of adminstrators' rights [5]. Figure 1 shows a common framework of access control policy adapted by most applications [3].…”
Section: Introductionmentioning
confidence: 99%