2017
DOI: 10.23919/tst.2017.8030537
|View full text |Cite
|
Sign up to set email alerts
|

Conflict analysis and detection based on model checking for spatial access control policy

Abstract: In this paper, we propose a Multi-granularity Spatial Access Control (MSAC) model, in which multigranularity spatial objects introduce more types of policy rule conflicts than single-granularity objects do. To analyze and detect these conflicts, we first analyze the conflict types with respect to the relationship among the policy rules, and then formalize the conflicts by template matrices. We designed a model-checking algorithm to detect potential conflicts by establishing formalized matrices of the policy se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
2
0
2

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 14 publications
0
2
0
2
Order By: Relevance
“…F. Ma et al proposed a fine-grained access control model for spatial data in a grid environment based on a role-based access control model [19]. Furthermore, a multi-granularity spatial access control model was proposed that introduces more types of policy rule conflicts than single-granularity objects [20]. The model can manage and enforce the strong and efficient access control technology in large-scale environments.…”
Section: Related Workmentioning
confidence: 99%
“…F. Ma et al proposed a fine-grained access control model for spatial data in a grid environment based on a role-based access control model [19]. Furthermore, a multi-granularity spatial access control model was proposed that introduces more types of policy rule conflicts than single-granularity objects [20]. The model can manage and enforce the strong and efficient access control technology in large-scale environments.…”
Section: Related Workmentioning
confidence: 99%
“…In fact, an XACML policy in distributed applications may be aggregated from multiple parties and can be managed by more than one administrator [8] which may arise anomalies between rules. Various research efforts have been devoted to anomaly detection of XACML policies using verification techniques [8,15,16,18,29,34]. The most important policy analysis techniques and formal approaches are presented by [37].…”
Section: Related Work and Contributionsmentioning
confidence: 99%
“…Ряд зарубежных источников [17][18][19][20][21][22][23][24][25], содержащих исследования по проблематике теории конфликтов, используют аппарат математического моделирования для анализа объектов и систем в различных предметных областях. В работах [17; 22; 23] исследуются причины, динамика конфликтов, возникающих при реализации социальных процессов в сфере жизнедеятельности общества.…”
Section: Introductionunclassified
“…Определяется множество участников конфликта и моделируются пути его разрешения с применением дифференциальных уравнений. Также категориально-понятийный аппарат теории конфликтов может быть применен при возникновении противоречий в политике предоставления доступа к данным в географических информационных системах [18], для прогнозирования и анализа траекторий движения воздушных судов и недопущения столкновений [19], для разработки математических моделей систем, оценивающих эпидемиологическую обстановку и динамику распространения инфекционных заболеваний [20], а также в моделях, разрабатываемых для оценки бизнес-процессов [21].…”
Section: Introductionunclassified