Specification and verification of access control policies in EB 3SEC: Work in progress

1Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information systems are widely used and help in the management of huge quantities of data. Generally, these data are valuable or sensitive, their access must be restricted to granted users. Security is a mandatory requirement for information systems. Several methods already exist to express access control policies, but few of them, like eb 3 sec, support all kinds of constraints that can be defined in access control policies. In this paper, we present how to use eb 3 sec to express two kinds of access control constraints : permissions and prohibitions. Once, constraints are expressed, we provide algorithms to verify that the model of the policy do not lead to deadlock. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Konopacki, P., Belhaouari, H., Frappier, M., & Laleau, R. (2012). Specification and verification of access control policies in EB 3SEC: Work in progress. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6888 LNCS, pp. 227–233). https://doi.org/10.1007/978-3-642-27901-0_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free