The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
Undecidability of safety for the schematic protection model with cyclic creates
Journal of Computer and System Sciences
Extending the Schematic Protection Model II: revocation
ACM SIGOPS Operating Systems Review
An Access Control Model and Its Use in Representing Mental Health Application Access Policy
IEEE Transactions on Knowledge and Data Engineering
Hi-index | 0.00 |
SPM formalism can be used to specify the protection structure of a system, and it also provides an algorithm to decide if some privileges can be granted to some subjects. This paper extends the model to take into account authentication and revocation. The authentication extension gives an algorithm to find out which authentication steps must be taken by a subject in order to gain some privileges. The revocation extension allows to decide whether certain privileges can be given back after they have been revoked. The two extensions are independent in the sense that each one corresponds to a change to a different part of the decision algorithm.