• DocumentCode
    517702
  • Title

    Available Separation-of-Duty Policies in Access Control

  • Author

    Wang, Baoping ; Zhao, Guang ; Liu, Jun ; Zhang, Xingang

  • Author_Institution
    Coll. of Comput. & Inf. Technol., Nanyang Normal Univ., Nanyang, China
  • Volume
    1
  • fYear
    2010
  • fDate
    24-25 April 2010
  • Firstpage
    290
  • Lastpage
    293
  • Abstract
    A separation-of-duty (SoD) policy requires a sensitive task to be performed by a set of users of size no less than some threshold. Such focus on safety properties probably stems from the fact that access control has been mostly viewed as a tool for restricting access. An equally important aspect of access control is the availability properties about enabling access. One example is an availability policy, which states that the cooperation of at most a certain number of users is required to successfully complete a task. In many situations, both safety and availability properties are required in the context of access control, though conflicts may arise due to their opposite focuses. In this paper, we combine a static SoD policy and an availability policy to introduce the available static SoD (ASSoD) policies to capture both of the safety and availability properties. We present the computational complexity of the satisfy checking problem of ASSoD policies, and show that it is intractable (both coNP-complete and NPcomplete) to checking whether an access control state satisfy an ASSoD policy. We also show that not all size-2 ASSoD policy set are composable, and study the composition properties of ASSoD policies.
  • Keywords
    authorisation; computational complexity; safety-critical software; access control; availability policy; computational complexity; safety properties; separation of duty policies; Access control; Availability; Computer networks; Computer security; Educational institutions; Information security; Information technology; National security; Permission; Safety; Access Control; availability; safety; separation-ofduty;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networks Security Wireless Communications and Trusted Computing (NSWCTC), 2010 Second International Conference on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-0-7695-4011-5
  • Electronic_ISBN
    978-1-4244-6598-9
  • Type

    conf

  • DOI
    10.1109/NSWCTC.2010.73
  • Filename
    5480680