A perspective on graphs and access control models

9Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying graph theory to access control problems goes back almost three decades. Nevertheless it is yet to make its way into the mainstream of access control research and practice. Much of this prior research is based on first principles, although more recently there have been significant efforts to build upon existing graph theory results and approaches. This paper gives a perspective on some of the connections between graphs and their transformations and access control models, particularly with respect to the safety problem and dynamic role hierarchies. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Sandhu, R. (2004). A perspective on graphs and access control models. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3256, 2–12. https://doi.org/10.1007/978-3-540-30203-2_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free