Constraints for role-based access control
RBAC '95 Proceedings of the first ACM Workshop on Role-based access control
Cellular automata transforms: theory and applications in multimedia compression, encryption, and modeling
ASIACRYPT '91 Proceedings of the International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
Theory of Self-Reproducing Automata
Theory of Self-Reproducing Automata
IEEE Transactions on Evolutionary Computation
Detecting conflict policy rules with concept lattice
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Hi-index | 0.00 |
Cellular automata (CA) have been accepted as a good evolutionary computational model for the simulation of complex physical systems. Meanwhile delegation of role is necessary for scalability of general computing environments. However, this practical principle can lead to conflicts at compile time and run time. Thus, we propose a policy for Separation of Duty (SoD) in Role-based Access Control (RBAC), and demonstrate how conflicts between specified SoD constraints and delegation activities can be detected based on evolutionary computation using Multiple-Attractor CA (MACA).