Abstract
A formal language to specify general access control policies and their sequences of transformations has been proposed in [1]. The access control policy was specified by a domain description which consisted of a finite set of initial policy propositions, policy transformation propositions and default propositions. Usually, access control models are falls into two conventional categories: discretionary access control(DAC) and mandatory access control(MAC). Traditional DAC models basically enumerate all the subjects and objects in a system and regulate the access to the object based on the identity of the subject. It can be best represented by the HRU's access control matrix [4]. While on the other hand, MAC models are lattice based models, in the sense that each subject and object is associated with a sensitivity level which forms a lattice [3]. In this paper, we intend to demonstrate that both a DAC-like model and a MAC-like model can be realized by an approach using our formal language. We also discuss some other related works.
| Original language | English |
|---|---|
| Title of host publication | Information Security and Privacy - 3rd Australasian Conference, ACISP 1998, Proceedings |
| Editors | Colin Boyd, Ed Dawson |
| Publisher | Springer Verlag |
| Pages | 273-283 |
| Number of pages | 11 |
| ISBN (Print) | 3540647325, 9783540647324 |
| DOIs | |
| Publication status | Published - 1998 |
| Event | 3rd Australasian Conference on Information Security and Privacy, ACISP 1998 - Brisbane, Australia Duration: 13 Jul 1998 → 15 Jul 1998 |
Publication series
| Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
|---|---|
| Volume | 1438 |
| ISSN (Print) | 0302-9743 |
| ISSN (Electronic) | 1611-3349 |
Conference
| Conference | 3rd Australasian Conference on Information Security and Privacy, ACISP 1998 |
|---|---|
| Country/Territory | Australia |
| City | Brisbane |
| Period | 13/07/98 → 15/07/98 |
Bibliographical note
Publisher Copyright:© Springer-Verlag Berlin Heidelberg 1998.
Keywords
- Access control model
- Authorization policies
- Formal language
- Policy transformations