Towards a general theory of action and time
Artificial Intelligence
Mandatory security in object-oriented database systems
OOPSLA '89 Conference proceedings on Object-oriented programming systems, languages and applications
IEEE Transactions on Software Engineering
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Communications of the ACM
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Support for security modeling in information systems design
Results of the Sixth Working Conference of IFIP Working Group 11.3 on Database Security on Database security, VI : status and prospects: status and prospects
Authorizations in relational database management systems
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Managing rules in active databases
Managing rules in active databases
An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects
Referential Integrity in Multilevel Secure Database Management Systems
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
Achieving Stricter Correctness Requirements in Multilevel Secure Databases
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Collecting Garbage in Multilevel Secure Object Stores
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
A Temporal Access Control Mechanism for Database Systems
IEEE Transactions on Knowledge and Data Engineering
An Extended Authorization Model for Relational Databases
IEEE Transactions on Knowledge and Data Engineering
A logical specification for usage control
Proceedings of the ninth ACM symposium on Access control models and technologies
Formal model and policy specification of usage control
ACM Transactions on Information and System Security (TISSEC)
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
Law-aware access control for international financial environments
Proceedings of the Eighth ACM International Workshop on Data Engineering for Wireless and Mobile Access
Policy Evolution in Distributed Usage Control
Electronic Notes in Theoretical Computer Science (ENTCS)
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
SecPAL: Design and semantics of a decentralized authorization language
Journal of Computer Security - Digital Identity Management (DIM 2007)
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
Foundation for a time interval access control model
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Securing information gateways with derivation-constrained access control
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Auditing a database under retention policies
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
This paper presents a discretionary access control model in which authorizations contain temporal information. This information can be used to specify temporal intervals of validity for authorizations and temporal dependencies among authorizations. A formal definition of those concepts is presented in the paper, in terms of their interpretation in first order logic. We characterize sets of temporal dependencies that can lead to undesirable states of the authorization system and we sketch an algorithm for their detection. Finally, operations to add, remove, or modify authorizations and temporal dependencies are described.