A completeness theorem for SLDNF resolution
Journal of Logic Programming
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
An access control model supporting periodicity constraints and temporal reasoning
ACM Transactions on Database Systems (TODS)
The next 700 programming languages
Communications of the ACM
Flexible support for multiple access control policies
ACM Transactions on Database Systems (TODS)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Certificate chain discovery in SPKI?SDSI
Journal of Computer Security
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Belief, information acquisition, and trust in multi-agent systems: a modal logic formulation
Artificial Intelligence
Flexible access control policy specification with constraint logic programming
ACM Transactions on Information and System Security (TISSEC)
A Generalized Temporal Role-Based Access Control Model
IEEE Transactions on Knowledge and Data Engineering
Design and Semantics of a Decentralized Authorization Language
CSF '07 Proceedings of the 20th IEEE Computer Security Foundations Symposium
A meta model for access control: why is it needed and is it even possible to achieve?
Proceedings of the 13th ACM symposium on Access control models and technologies
ACM Transactions on Information and System Security (TISSEC)
Improving application security with data flow assertions
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
Personalizing access control by generalizing access control
Proceedings of the 15th ACM symposium on Access control models and technologies
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Defining access control rules with conditions
RuleML'10 Proceedings of the 2010 international conference on Semantic web rules
Journal of Systems Architecture: the EUROMICRO Journal
Adversaries' Holy Grail: access control analytics
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
Rumpole: a flexible break-glass access control model
Proceedings of the 16th ACM symposium on Access control models and technologies
An approach to modular and testable security models of real-world health-care applications
Proceedings of the 16th ACM symposium on Access control models and technologies
Secommunity: a framework for distributed access control
LPNMR'11 Proceedings of the 11th international conference on Logic programming and nonmonotonic reasoning
Socially constructed trust for distributed authorization
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Rewrite specifications of access control policies in distributed environments
STM'10 Proceedings of the 6th international conference on Security and trust management
Category-Based authorisation models: operational semantics and expressive power
ESSoS'10 Proceedings of the Second international conference on Engineering Secure Software and Systems
Towards access control model engineering
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Logical approaches to authorization policies
Logic Programs, Norms and Action
Configuring private data management as access restrictions: from design to enforcement
ICSOC'12 Proceedings of the 10th international conference on Service-Oriented Computing
Automated analysis of rule-based access control policies
PLPV '13 Proceedings of the 7th workshop on Programming languages meets program verification
An information flow control meta-model
Proceedings of the 18th ACM symposium on Access control models and technologies
Panel on granularity in access control
Proceedings of the 18th ACM symposium on Access control models and technologies
An access control framework for hybrid policies
Proceedings of the 6th International Conference on Security of Information and Networks
Designing flexible access control models for the cloud
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
We address some fundamental questions, which were raised by Atluri and Ferraiolo at SACMAT'08, on the prospects for and benefits of a meta-model of access control. We demonstrate that a meta-model for access control can be defined and that multiple access control models can be derived as special cases. An anticipated consequence of the contribution that we describe is to encourage researchers to adopt a meta-model view of access control rather than them developing the next 700 particular instances of access control models.