2007
DOI: 10.1007/978-0-387-72367-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Management of Exceptions on Access Control Policies

Abstract: Abstract. The use of languages based on positive or negative expressiveness is very common for the deployment of security policies (i.e., deployment of permissions and prohibitions on firewalls through singlehanded positive or negative condition attributes). Although these languages may allow us to specify any policy, the single use of positive or negative statements alone leads to complex configurations when excluding some specific cases of general rules that should always apply. In this paper we survey such … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
2
2
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…Since one of the target scenarios of our system is healthcare, we believe it is interesting to see how our proposal differs from the many existing access control models proposed for this domain (e.g., [5], [4], [2]). The main difference is that these models do not support emergency descriptions and the use of CEP for emergency detection.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since one of the target scenarios of our system is healthcare, we believe it is interesting to see how our proposal differs from the many existing access control models proposed for this domain (e.g., [5], [4], [2]). The main difference is that these models do not support emergency descriptions and the use of CEP for emergency detection.…”
Section: Related Workmentioning
confidence: 99%
“…In this case, the arrival of a tuple t such that t:temp ¼ 38 results in the simultaneous creation and deletion of the corresponding emergency and tacp instances. 2 We formally define this problem by showing also the correctness and enforcement in the following sections.…”
Section: Emergency Policy Correctnessmentioning
confidence: 99%
“…We distinguish the set of subjects S (the who), the set of permissions P (the what), and the access relation SP ⊆ S × P (who gets to do what). In Figure 1a this situation is depicted using an entity relationship diagram 1 This very limited conceptual framework suffices in practice only as long as S and P are relatively small sets. If the cardinalities of S and P are too large there are too many pairs in S × P to consider.…”
Section: Access Controlmentioning
confidence: 99%
“…For practitioners this typically means, that, when an exception arises, instead of exercising in transformations of logical expressions and consequent rewriting of existing AC rules, security officers can generalise the exception, and cleanly and compositionally adapt the previous AC specification touching far fewer rules (for very practical examples see [1]). For that matter we shall give an extensive example on how and why negative objects of indirection could work in practice.…”
Section: Introductionmentioning
confidence: 99%
“…For example, MS-Windows firewalls exclusively specify exceptions, since the basic default effect is deny. Optimizing the specification of exceptions has been addressed in [11]. However, in a language with the capability to express complex conditions with multiple ranges in a single rule, the full extensions to language expressiveness that they propose would not be necessary.…”
Section: Expressiveness Of Languagesmentioning
confidence: 99%