2015
DOI: 10.1007/978-3-319-28865-9_24
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Transmission Control Rules Compliant with Existing Access Control Policies

Abstract: Abstract. Access Control (AC) is a well known mechanism that allows access restriction to resources. Nevertheless, it does not provide notification when a resource is retransmitted to an unauthorized third party. To overcome this issue, one can use mechanisms such as Data Loss/Leak Prevention (DLP) or Transmission Control (TC). These mechanisms are based on policies that are defined by security experts. Unfortunately, these policies can contradict existing AC rules, leading to security leakage (i.e. a legitima… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 17 publications
0
1
0
Order By: Relevance
“…Subjects store their capabilities as sets of pairs (x i , tRu), where x represents a resource and tRu represents the set of access rights to the resource granted to the subject. PBAC allows flexible management of access rules using policies -expressed as sets of rules combined to decide authorization and determine authorization level -and can be seen as a standardization of ABAC for governance-oriented structures [33]. Restricting user access to resources using an access control API has been introduced earlier [34,7], as well as limiting access to data based on higher-level attributes (e.g.…”
Section: Scalable Access Control For Sdn Resourcesmentioning
confidence: 99%
“…Subjects store their capabilities as sets of pairs (x i , tRu), where x represents a resource and tRu represents the set of access rights to the resource granted to the subject. PBAC allows flexible management of access rules using policies -expressed as sets of rules combined to decide authorization and determine authorization level -and can be seen as a standardization of ABAC for governance-oriented structures [33]. Restricting user access to resources using an access control API has been introduced earlier [34,7], as well as limiting access to data based on higher-level attributes (e.g.…”
Section: Scalable Access Control For Sdn Resourcesmentioning
confidence: 99%