Title :
Term rewriting for describing constrained policy graph and conflict detection
Author :
Khairdoost, Nima ; Ghahraman, Nayereh
Author_Institution :
Dept. of Comput. Eng., Univ. of Isfahan, Isfahan, Iran
Abstract :
Constrained policy graph (CPG) is an imaginative graph and is in a high level understanding in comparison with pure logic. In this model we can describe the policies in constrained form according to the related system. In addition to the ability of describing ACPs, CPG model is able to combine policies and analyze them in order to detect possible conflicts arising from ACPs combination. Term rewriting systems are practical systems used in different fields including automatic theorem proving and developing computational models. Using term rewriting can help us in formal description and verification of access control policies (ACPs) and models. In this article after expression of how policies are described, their combination and conflict detection in CPG model, we describe them using term rewriting rules. These rules are appropriate tools for the automatic analysis of policies and conflict detection after their combination.
Keywords :
authorisation; graph theory; rewriting systems; ACP combination; CPG; access control policies; automatic theorem; conflict detection; constrained policy graph description; formal description; term rewriting; Computational modeling; conflict; constrained policy graph; policy combination; rewriting rules;
Conference_Titel :
Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-6788-4
DOI :
10.1109/PIC.2010.5687864