2017 IEEE World Congress on Services (SERVICES) 2017
DOI: 10.1109/services.2017.24
|View full text |Cite
|
Sign up to set email alerts
|

Provenance-Based Analytics Services for Access Control Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Signed authorizations have been widely investigated [186], and also introduced in access control systems of commercial products (e.g., the access control model of SQL Server provides the negative authorization by the DENY authorization command SQL [9]). See [41] for a denition of RBAC with signed authorizations.…”
Section: Role-based Access Control (Rbac)mentioning
confidence: 99%
See 2 more Smart Citations
“…Signed authorizations have been widely investigated [186], and also introduced in access control systems of commercial products (e.g., the access control model of SQL Server provides the negative authorization by the DENY authorization command SQL [9]). See [41] for a denition of RBAC with signed authorizations.…”
Section: Role-based Access Control (Rbac)mentioning
confidence: 99%
“…The notion of policy quality was introduced by Bertino et al [41] as a set of basic policy requirements. Assuring the quality of a set of policies can be stated as the problem of making sure that the set of policies be consistent, minimal, relevant, complete, and correct.…”
Section: Assessment Of Policy Alitymentioning
confidence: 99%
See 1 more Smart Citation
“…"Low quality" examples include inconsistent responses to similar requests and requests associated with irrelevant responses which do not reflect appropriate decisions of a policies (i.e., 'not applicable' decision for XACML policies). Formal definitions of "low quality" examples can be adapted from the definitions of "low quality" policies by Bertino et al [14], [31]. These formal definitions enable analyzing policies [31], [32].…”
Section: Access Control Policiesmentioning
confidence: 99%
“…Formal definitions of "low quality" examples can be adapted from the definitions of "low quality" policies by Bertino et al [14], [31]. These formal definitions enable analyzing policies [31], [32]. Similarly, adapted definitions for "low quality" examples can enable analyzing and refining the example dataset to obtain a noisefree one.…”
Section: Access Control Policiesmentioning
confidence: 99%