DocumentCode :
2077342
Title :
Term rewriting for describing constrained policy graph and conflict detection
Author :
Khairdoost, Nima ; Ghahraman, Nayereh
Author_Institution :
Dept. of Comput. Eng., Univ. of Isfahan, Isfahan, Iran
Volume :
1
fYear :
2010
fDate :
10-12 Dec. 2010
Firstpage :
645
Lastpage :
651
Abstract :
Constrained policy graph (CPG) is an imaginative graph and is in a high level understanding in comparison with pure logic. In this model we can describe the policies in constrained form according to the related system. In addition to the ability of describing ACPs, CPG model is able to combine policies and analyze them in order to detect possible conflicts arising from ACPs combination. Term rewriting systems are practical systems used in different fields including automatic theorem proving and developing computational models. Using term rewriting can help us in formal description and verification of access control policies (ACPs) and models. In this article after expression of how policies are described, their combination and conflict detection in CPG model, we describe them using term rewriting rules. These rules are appropriate tools for the automatic analysis of policies and conflict detection after their combination.
Keywords :
authorisation; graph theory; rewriting systems; ACP combination; CPG; access control policies; automatic theorem; conflict detection; constrained policy graph description; formal description; term rewriting; Computational modeling; conflict; constrained policy graph; policy combination; rewriting rules;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on
Conference_Location :
Shanghai
Print_ISBN :
978-1-4244-6788-4
Type :
conf
DOI :
10.1109/PIC.2010.5687864
Filename :
5687864
Link To Document :
بازگشت