Proceedings of the 14th ACM Conference on Computer and Communications Security 2007
DOI: 10.1145/1315245.1315300
|View full text |Cite
|
Sign up to set email alerts
|

Efficient policy analysis for administrative role based access control

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

2
257
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 88 publications
(259 citation statements)
references
References 25 publications
2
257
0
Order By: Relevance
“…Such a technical problem seems to be the most useful security question for ARBAC systems. Indeed, almost all interesting security questions can be reduced to the above problem (see [10,22,4]). Unfortunately, it is very hard to verify security of ARBAC policies precisely.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Such a technical problem seems to be the most useful security question for ARBAC systems. Indeed, almost all interesting security questions can be reduced to the above problem (see [10,22,4]). Unfortunately, it is very hard to verify security of ARBAC policies precisely.…”
Section: Introductionmentioning
confidence: 99%
“…If the number of users is very small, this can be achieved in practice using model-checking techniques that use symbolic representations of state-spaces (like BDDs), but any realistic scenario would involve thousands of users, making this completely intractable. For those reasons researchers have turned to consider either restricted scenarios or abstraction techniques [22,9,4].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations