Automated Decomposition of Access Control Policies

  • Authors:
  • Linying Su;David W. Chadwick;Andrew Basden;James A. Cunningham

  • Affiliations:
  • University of Kent;University of Kent;University of Salford;University of Salford

  • Venue:
  • POLICY '05 Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The resources may be considered as a single abstract hierarchical resource. An access control policy at a high level should be able to define who is allowed to use the resources. At lower levels, the policy will address controlling access to concrete resources. By modelling the resource hierarchy, it is possible that low level policies can be automatically produced from the high level policy. These low level policies can then be distributed to the concrete resources that use an existing policy based access control decision system so that the high level policy can be enforced throughout the system. In this paper a model for representing and refining high level policies is presented. Other relevant issues and examples for demonstrating the capability of the policy decomposition (refinement) process are also presented.