A framework for policy similarity evaluation and migration based on change detection

7Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Access control facilitates controlled sharing and protection of resources in an enterprise. However, given the ubiquity of collaborative applications and scenarios, enterprises no longer function in isolation. Being able to measure policy similarity and integrate heterogeneous policies appropriately is an essential step towards secure interoperation. Existing approaches for measuring policy similarity are based on computing similarity between different components of the access control policy. However, this does not provide a pathway for integrating policies, and may not sufficiently take the security context into account. In this paper, we propose a holistic change detection approach that enables policy similarity evaluation and policy migration. Our approach more comprehensively takes into account different access control semantics to compute policy similarity and finds the common organizational policy with the least cost.

Cite

CITATION STYLE

APA

Vaidya, J., Shafiq, B., Atluri, V., & Lorenzi, D. (2015). A framework for policy similarity evaluation and migration based on change detection. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9408, pp. 191–205). Springer Verlag. https://doi.org/10.1007/978-3-319-25645-0_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free