On the sequence of authorization policy transformations

Yun Bai, Yan Zhang, Vijay Varadharajan

    Research output: Contribution to journalArticle

    Abstract

    In [2, 3], we proposed a model-based approach to specify the transformation of authorizations based on the principle of minimal change [1] and its application in database systems. Nevertheless, there were some limitations in this approach. Firstly, we could not represent a sequence of transformations. Secondly, default authorizations could not be expressed. In this paper, we propose two high-level formal languages, L s and L sd, to specify a sequence of authorization transformations and default authorizations. Our work starts with L s, a simple, but expressive, language to specify certain sequence of authorization transformations. Furthermore, L sd has more powerful expressiveness than L s in the sense that constraints, causal and inherited authorizations, and general default authorizations can be specified.
    Original languageEnglish
    Pages (from-to)120-131
    Number of pages12
    JournalInternational Journal of Information Security
    Volume4
    Issue number1-2
    DOIs
    Publication statusPublished - Feb 2005

    Keywords

    • Computer security
    • Data protection
    • Database security
    • Default reasoning
    • Formal language
    • Authorization policy
    • Policy transformations
    • Default logic

    Fingerprint

    Dive into the research topics of 'On the sequence of authorization policy transformations'. Together they form a unique fingerprint.

    Cite this