Information systems are widely used and help in the management of huge quantities of data. Generally, these data are valuable or sensitive, their access must be restricted to granted users. Security is a mandatory requirement for information systems. Several methods already exist to express access control policies, but few of them, like eb 3 sec, support all kinds of constraints that can be defined in access control policies. In this paper, we present how to use eb 3 sec to express two kinds of access control constraints : permissions and prohibitions. Once, constraints are expressed, we provide algorithms to verify that the model of the policy do not lead to deadlock. © 2012 Springer-Verlag.
CITATION STYLE
Konopacki, P., Belhaouari, H., Frappier, M., & Laleau, R. (2012). Specification and verification of access control policies in EB 3SEC: Work in progress. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6888 LNCS, pp. 227–233). https://doi.org/10.1007/978-3-642-27901-0_18
Mendeley helps you to discover research relevant for your work.