DocumentCode
517702
Title
Available Separation-of-Duty Policies in Access Control
Author
Wang, Baoping ; Zhao, Guang ; Liu, Jun ; Zhang, Xingang
Author_Institution
Coll. of Comput. & Inf. Technol., Nanyang Normal Univ., Nanyang, China
Volume
1
fYear
2010
fDate
24-25 April 2010
Firstpage
290
Lastpage
293
Abstract
A separation-of-duty (SoD) policy requires a sensitive task to be performed by a set of users of size no less than some threshold. Such focus on safety properties probably stems from the fact that access control has been mostly viewed as a tool for restricting access. An equally important aspect of access control is the availability properties about enabling access. One example is an availability policy, which states that the cooperation of at most a certain number of users is required to successfully complete a task. In many situations, both safety and availability properties are required in the context of access control, though conflicts may arise due to their opposite focuses. In this paper, we combine a static SoD policy and an availability policy to introduce the available static SoD (ASSoD) policies to capture both of the safety and availability properties. We present the computational complexity of the satisfy checking problem of ASSoD policies, and show that it is intractable (both coNP-complete and NPcomplete) to checking whether an access control state satisfy an ASSoD policy. We also show that not all size-2 ASSoD policy set are composable, and study the composition properties of ASSoD policies.
Keywords
authorisation; computational complexity; safety-critical software; access control; availability policy; computational complexity; safety properties; separation of duty policies; Access control; Availability; Computer networks; Computer security; Educational institutions; Information security; Information technology; National security; Permission; Safety; Access Control; availability; safety; separation-ofduty;
fLanguage
English
Publisher
ieee
Conference_Titel
Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
Conference_Location
Wuhan, Hubei
Print_ISBN
978-0-7695-4011-5
Electronic_ISBN
978-1-4244-6598-9
Type
conf
DOI
10.1109/NSWCTC.2010.73
Filename
5480680
Link To Document