On lattices in access control models

5Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Lattices have been extensively used for implementing mandat tory access control policies. Typically, only a small sublattice of the subset lattice of a certain alphabet is used in applications. We argue that attribute exploration from formal concept analysis is an appropriate tool for generating this sublattice in a semiautomatic fashion. We discuss how two access control models addressing different (in a sense, opposite) requirements can be incorporated within one model. In this regard, we propose two operations that combine contexts of the form (G, M, I) and (N, G, J). The resulting concept lattices provide most of the required structure. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Obiedkov, S., Kourie, D. G., & Eloff, J. H. P. (2006). On lattices in access control models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4068 LNAI, pp. 374–387). Springer Verlag. https://doi.org/10.1007/11787181_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free