On the sequence of authorization policy transformations

Yun Bai, Yan Zhang, Vijay Varadharajan

Research output: Contribution to journalArticle

Abstract

In [2, 3], we proposed a model-based approach to specify the transformation of authorizations based on the principle of minimal change [1] and its application in database systems. Nevertheless, there were some limitations in this approach. Firstly, we could not represent a sequence of transformations. Secondly, default authorizations could not be expressed. In this paper, we propose two high-level formal languages, L s and L sd, to specify a sequence of authorization transformations and default authorizations. Our work starts with L s, a simple, but expressive, language to specify certain sequence of authorization transformations. Furthermore, L sd has more powerful expressiveness than L s in the sense that constraints, causal and inherited authorizations, and general default authorizations can be specified.
Original languageEnglish
Pages (from-to)120-131
Number of pages12
JournalInternational Journal of Information Security
Volume4
Issue number1-2
DOIs
Publication statusPublished - Feb 2005

Keywords

  • Computer security
  • Data protection
  • Database security
  • Default reasoning
  • Formal language
  • Authorization policy
  • Policy transformations
  • Default logic

Fingerprint

Dive into the research topics of 'On the sequence of authorization policy transformations'. Together they form a unique fingerprint.

Cite this