Modeling of the role-based access control policy with constraints using description logic

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security policies form a collection of access restrictions on objects and resources. In this paper, we introduce an access control model with constraints that are common in typical information systems. This access control model is based on the role-based access control policy. It is modified to represent object classes and their hierarchies. The formalization of the proposed policy and constraints is performed using a logical approach based on description logics. Several access control constraints are discussed. The capability of the proposed model to formalize object-based constraints is demonstrated. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Chae, J. (2007). Modeling of the role-based access control policy with constraints using description logic. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4705 LNCS, pp. 500–511). Springer Verlag. https://doi.org/10.1007/978-3-540-74472-6_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free