Modeling of the Role-Based Access Control Policy with Constraints Using Description Logic.

Autor: Hutchison, David, Kanade, Takeo, Kittler, Josef, Kleinberg, Jon M., Mattern, Friedemann, Mitchell, John C., Naor, Moni, Nierstrasz, Oscar, Pandu Rangan, C., Steffen, Bernhard, Sudan, Madhu, Terzopoulos, Demetri, Tygar, Doug, Vardi, Moshe Y., Weikum, Gerhard, Gervasi, Osvaldo, Gavrilova, Marina L., Chae, Junghwa
Zdroj: Computational Science & Its Applications - ICCSA 2007 (978-3-540-74468-9); 2007, p500-511, 12p
Abstrakt: Security policies form a collection of access restrictions on objects and resources. In this paper, we introduce an access control model with constraints that are common in typical information systems. This access control model is based on the role-based access control policy. It is modified to represent object classes and their hierarchies. The formalization of the proposed policy and constraints is performed using a logical approach based on description logics. Several access control constraints are discussed. The capability of the proposed model to formalize object-based constraints is demonstrated. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index