z-logo
open-access-imgOpen Access
Algebraic Model for Handling Access Control Policies
Author(s) -
Khair Eddin Sabri,
Hazem Hiary
Publication year - 2016
Publication title -
procedia computer science
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.334
H-Index - 76
ISSN - 1877-0509
DOI - 10.1016/j.procs.2016.04.146
Subject(s) - computer science , control (management) , algebraic number , access control , theoretical computer science , computer security , artificial intelligence , mathematical analysis , mathematics
Confidentiality of information is an important aspect that developers should take into consideration when building systems. One way to achieve confidentiality is to define access control policies that give authorization rules for allowing users to access resources. In large organizations, managing policies becomes a complex task. Usually, based on the defined policies, developers would need to manipulate policies such as composing them and enforcing predefined security constraints. In this paper, we present an algebraic model for specifying access control policies. It consists of a few number of operators which gives simplicity in specifying policies. The proposed model enables us to specify policies and enforce predefined security constraints. Furthermore, the model allows us to combine policies and analyze their effect on predefined constraints. Furthermore, it enables comparing the sensitivity of objects (e.g. files) and authority of subjects (e.g. users)

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom