Resolving constraint conflicts
Proceedings of the ninth ACM symposium on Access control models and technologies
Methods and limitations of security policy reconciliation
ACM Transactions on Information and System Security (TISSEC)
Graph-theoretic method for merging security system specifications
Information Sciences: an International Journal
Human-to-Human authorization for resource sharing in SHAD: Roles and protocols
Pervasive and Mobile Computing
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
Authorization control in collaborative healthcare systems
Journal of Theoretical and Applied Electronic Commerce Research
A secure collaboration service for dynamic virtual organizations
Information Sciences: an International Journal
Access control: what is required in business collaboration?
ADC '09 Proceedings of the Twentieth Australasian Conference on Australasian Database - Volume 92
Hi-index | 0.00 |
A major hurdle in sharing resources between organizationsis heterogeneity. Therefore, in order for two organizationsto collaborate their policies have to be resolved. Theprocess of resolving different policies is known as policyreconciliation, which in general is an intractable problem.This paper addresses policy reconciliation in the context ofsecurity. We present a formal framework and hierarchicalrepresentation for security policies. Our hierarchical representationexposes the structure of the policies and leads toan efficient reconciliation algorithm. We also demonstratethat agent preferences for security mechanisms can be readilyincorporated into our framework. We have implementedour reconciliation algorithm in a library called the PolicyReconciliation Engine or PRE. In order to test the implementationand measure the overhead of our reconciliationalgorithm, we have integrated PRE into a distributed high-throughputsystem called Condor.