Analysis and Comparison of Access Control Policies Validation Mechanisms

  • Aqib M
  • Ahmed Shaikh R
N/ACitations
Citations of this article
18Readers
Mendeley users who have this article in their library.

Abstract

Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and incompleteness. In order to detect such problems, various access control policy validation mechanisms are proposed by the researchers. However, comprehensive analysis and evaluation of the existing access control policy validation techniques is missing in the literature. In this paper, we have provided a first detailed survey of this domain and presented the taxonomy of the access control policy validation mechanisms. Furthermore, we have provided a qualitative comparison and trend analysis of the existing schemes. From this survey, we found that only few validation mechanisms exist that can handle both inconsistency and incompleteness problem. Also, most of the policy validation techniques are inefficient in handling continuous values and Boolean expressions.

Cite

CITATION STYLE

APA

Aqib, M., & Ahmed Shaikh, R. (2014). Analysis and Comparison of Access Control Policies Validation Mechanisms. International Journal of Computer Network and Information Security, 7(1), 54–69. https://doi.org/10.5815/ijcnis.2015.01.08

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free