2009
DOI: 10.3923/itj.2009.726.734
|View full text |Cite
|
Sign up to set email alerts
|

Security Policy Management for Systems Employing Role Based Access Control Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…Most of related works treat the notion of validating access control policies only during the specification or after the implementation. Their main objectives are to check the exactitude of the specification before proceeding to the implementation [4], [10], [15], [26], [27], [29], [37] or to verify the correctness of the implementation regarding the defined constraints [6], [14]. The aspect of checking the correspondence between the security planning and its real imp lementation, especially in terms of access control, according to our knowledge is not treated enough and needs more attention.…”
Section: B Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most of related works treat the notion of validating access control policies only during the specification or after the implementation. Their main objectives are to check the exactitude of the specification before proceeding to the implementation [4], [10], [15], [26], [27], [29], [37] or to verify the correctness of the implementation regarding the defined constraints [6], [14]. The aspect of checking the correspondence between the security planning and its real imp lementation, especially in terms of access control, according to our knowledge is not treated enough and needs more attention.…”
Section: B Discussionmentioning
confidence: 99%
“…Authors adopt a finite model checking to verify that an RBAC implementation conforms to its security constraints. (2) Detection of redundancy and inconsistency anomalies in the expression of a security policy [6]. By adopting the graph of roles, authors identify redundancy by the coexistence of direct and indirect privilege assignments (by transitivity) of the same privilege.…”
Section: A Related Workmentioning
confidence: 99%
“…Bottom-Up Approach that starts with already existing access right patterns in production IT-systems: this approach is not intuitive and relies among other techniques on mathematical and graph optimization algorithms [38]. Policy management includes redundancy and inconsistency checking between rules [20]. Access control redundancy means the existence of two or more rules specifying the same access control and inconsistency means there are access control rules conflicting with each other in the policy.…”
Section: Role Engineering For Role-based Access Controlmentioning
confidence: 99%
“…(1) Validation of the implemented policy regarding the security constraints defined around that policy [4] using a finite model checking. (2) Detection of redundancy and inconsistency anomalies in the expression of a security policy [5] by adopting the formalism of graph of roles. The main objective of those works is to verify the correctness of the implemented policy regarding the defined constraints.…”
Section: Related Workmentioning
confidence: 99%