The consistency of an access control list

1Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper gives firstly an introduction about the consistency of an Access Control List (ACL). It uses triples or in other words, in three dimensions and their corresponding decisions to describe the access control rules, i.e. ACL entries. We present then and justify the mathematical definitions of an ACL and its related components and discuss its consistency, two theorems about the consistency of the ACL. Thirdly the paper discusses verification of the consistency of the ACL and a new method used to verify the consistency of the ACL derived from the theorems in use. The method obtained here is a theoretical approach. In the conclusion, we point out that in a practical system, verification of the consistency of the ACL is necessary and the method is an effective and efficient one, further measures should be taken and study should be continued to reduce the amount of computation needed to examine the consistency of the ACL.

Cite

CITATION STYLE

APA

Li, S. P., Wu, S. Z., & Guo, T. (2002). The consistency of an access control list. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2513, pp. 367–373). Springer Verlag. https://doi.org/10.1007/3-540-36159-6_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free