DocumentCode :
2604756
Title :
Inconsistency detection method for access control policies
Author :
Shaikh, Riaz Ahmed ; Adi, Kamel ; Logrippo, Luigi ; Mankovski, Serge
Author_Institution :
Dept. of Comput. Sci. & Eng., Univ. du Quebec en Outaouais, Gatineau, QC, Canada
fYear :
2010
fDate :
23-25 Aug. 2010
Firstpage :
204
Lastpage :
209
Abstract :
In enterprise environments, the task of assigning access control rights to subjects for resources is not trivial. Because of their complexity, distribution and size, access control policies can contain anomalies such as inconsistencies, which can result in security vulnerabilities. A set of access control policies is inconsistent when, for specific situations different incompatible policies can apply. Many researchers have tried to address the problem of inconsistency using methods based on formal logic. However, this approach is difficult to implement and inefficient for large policy sets. Therefore, in this paper, we propose a simple, efficient and practical solution for detecting inconsistencies in access control policies with the help of a modified C4.5 data classification algorithm.
Keywords :
authorisation; commerce; data analysis; decision trees; access control policy; data classification algorithm; enterprise environment; inconsistency detection method; Access control; Data mining; Data structures; Decision trees; Medical services; Metals; Access control; Data classification; Decision tree; Inconsistency; Policy validation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security (IAS), 2010 Sixth International Conference on
Conference_Location :
Atlanta, GA
Print_ISBN :
978-1-4244-7407-3
Type :
conf
DOI :
10.1109/ISIAS.2010.5604062
Filename :
5604062
Link To Document :
بازگشت