Foundations for a graph-based approach to the specification of access control policies

17Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Graph Transformations provide a uniform and precise frame- work for the specification of access control policies allowing the detailed comparison of different policy models and the precise description of the evolution of a policy. Furthermore, the framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of conflicting rules. The integration of policies is illustrated using the Discretionary Access Control and the Lattice Based Access Control policies.

Cite

CITATION STYLE

APA

Koch, M., Mancini, L. V., & Parisi-Presicce, F. (2001). Foundations for a graph-based approach to the specification of access control policies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2030, pp. 287–302). Springer Verlag. https://doi.org/10.1007/3-540-45315-6_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free