A DL-based method for access control policy conflict detecting

  • Authors:
  • Feng Huang;Zhiqiu Huang;Linyuan Liu

  • Affiliations:
  • Nanjing University of Aeronautics and Astronautics, Nanjing, China;Nanjing University of Aeronautics and Astronautics, Nanjing, China;Nanjing University of Aeronautics and Astronautics, Nanjing, China

  • Venue:
  • Proceedings of the First Asia-Pacific Symposium on Internetware
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

As the quick development and application of technology such as Web Service, software or programs with special feature exist as public services in internet. They are queried and assembled under specific requirement. Being a passive control technique for data security, access control should have the ability to work synergistically across different organizations to prevent unauthorized access to special data, while these services or organizations share same role hierarchy and resource hierarchy, there may be conflicts on the overall security policies. XACML can be used to describe security policies by these public services, as it is a standardized expressive language for access control policies. Whereas Description Logics has the capability of representing knowledge and reasoning, a method that maps XACML policies to Description Logics Knowledge Base was proposed, and then the conflict detection problem is transformed into a problem of consistency in ABox.