RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Embedding security policies into a distributed computing environment
ACM SIGOPS Operating Systems Review
Flexible enterprise access control with object-oriented view specification
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Security rules versus security properties
ICISS'10 Proceedings of the 6th international conference on Information systems security
Hi-index | 0.00 |
This paper describes an algebraic approach to the security engineering of lattice policies. The approach extends earlier lattice and algebraic work, and has two main goals. First, it seeks to model access control policies with anti-symmetry, reflexivity and transitivity exceptions using a lattice, and to propose an information flow security definition for the resulting set (POL) of policies. Second, it supports a constructive approach to policy specification through an algebraic structure (POL, AND, OR, NOT, =,