Lattices have been extensively used for implementing mandat tory access control policies. Typically, only a small sublattice of the subset lattice of a certain alphabet is used in applications. We argue that attribute exploration from formal concept analysis is an appropriate tool for generating this sublattice in a semiautomatic fashion. We discuss how two access control models addressing different (in a sense, opposite) requirements can be incorporated within one model. In this regard, we propose two operations that combine contexts of the form (G, M, I) and (N, G, J). The resulting concept lattices provide most of the required structure. © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Obiedkov, S., Kourie, D. G., & Eloff, J. H. P. (2006). On lattices in access control models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4068 LNAI, pp. 374–387). Springer Verlag. https://doi.org/10.1007/11787181_27
Mendeley helps you to discover research relevant for your work.