Artificial intelligence: a modern approach
Artificial intelligence: a modern approach
Semiring-based constraint satisfaction and optimization
Journal of the ACM (JACM)
Semiring-based constraint logic programming: syntax and semantics
ACM Transactions on Programming Languages and Systems (TOPLAS)
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
On the Negotiation of Access Control Policies
Revised Papers from the 9th International Workshop on Security Protocols
Compiling Semiring-Based Constraints with clp (FD, S)
CP '98 Proceedings of the 4th International Conference on Principles and Practice of Constraint Programming
Towards Automated Negotiation of Access Control Policies
POLICY '03 Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
Development of parallel, spatial, compliant manipulators
Development of parallel, spatial, compliant manipulators
Negotiation and management of coalition resources
Negotiation and management of coalition resources
Hi-index | 0.00 |
We describe an architecture and algorithms for deriving an access control policy by composing access control requirements specified at multiple levels in a command hierarchy. Our method can detect conflicts in requirements, and find a policy that maximally satisfies the requirements, by satisfying higher priority requirements at the expense of lower priority ones. It also allows for easy verification of the final policy by an administrator. The architecture allows quick adaptation of policies to changing situations, by providing for delegation of authority while ensuring that high priority requirements will always be satisfied.