Security policies form a collection of access restrictions on objects and resources. In this paper, we introduce an access control model with constraints that are common in typical information systems. This access control model is based on the role-based access control policy. It is modified to represent object classes and their hierarchies. The formalization of the proposed policy and constraints is performed using a logical approach based on description logics. Several access control constraints are discussed. The capability of the proposed model to formalize object-based constraints is demonstrated. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Chae, J. (2007). Modeling of the role-based access control policy with constraints using description logic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4705 LNCS, pp. 500–511). Springer Verlag. https://doi.org/10.1007/978-3-540-74472-6_41
Mendeley helps you to discover research relevant for your work.