Role-Based Access Control Models
Computer
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model
COMPSAC '02 Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment
Decidability of Safety in Graph-Based Models for Access Control
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Design of a Role-Based Trust-Management Framework
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
Using trust and risk in role-based access control policies
Proceedings of the ninth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Fidelis: a policy-driven trust management framework
iTrust'03 Proceedings of the 1st international conference on Trust management
Dynamic access control research for inter-operation in multi-domain environment based on risk
WISA'07 Proceedings of the 8th international conference on Information security applications
Decentralized trust management
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
A survey of trust in internet applications
IEEE Communications Surveys & Tutorials
Hi-index | 0.00 |
Access control system is often described as a state transition system. Given a set of access control policies, a general safety requirement in such a system is to determine whether a desirable property is satisfied in all the reachable states. In this paper, we propose to use security analysis techniques to maintain desirable security properties in the Multi-domain Environment based on risk model (MD${\it R^2}$BAC). We give a precise definition of security analysis problems in MD${\it R^2}$BAC, which is more general than safety analysis that is studied in single-domain. We show the process of dynamic permission adjustment in multi-domain environment, and illustrate two classes of problems in the process which can be reduced to similar analysis in the RT[←,∩] role-based trust-management language, thereby establishing an interesting relationship between MD${\it R^2}$BAC and the RT framework. The reduction gives efficient algorithms for answering most kinds of queries in the two stages of dynamic adjustment permissions.