DocumentCode
2103264
Title
Conflicts analysis and resolution for access control policies
Author
Wang, Yigong ; Zhang, Hongqi ; Dai, Xiangdong ; Liu, Jiang
Author_Institution
Henan Key Lab. of Inf. Security, Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
fYear
2010
fDate
17-19 Dec. 2010
Firstpage
264
Lastpage
267
Abstract
Access control is the central mechanism for achieving security requirements in information systems. The guarantee of the security requirements, described by access control policies (ACPs), cannot be obtained when there exist conflicts in ACPs. In this paper, we propose an improved access control model that is flexible and effective for conflict analysis of ACPs. We analyze three types of policy conflicts in this model, which are modality conflict, redundancy conflict and potential conflict, and then the respective resolution methods are proposed. Finally, we prove that these methods can effectively resolve conflicts in ACPs, and that after resolving the potential conflicts, the policies cannot derive any actual conflict.
Keywords
authorisation; information systems; ACP; access control model; access control policy; central mechanism; conflict resolution; conflicts analysis; information systems; modality conflict; potential conflict; redundancy conflict; security requirements; Analytical models; Authorization; Computer architecture; Information systems; Redundancy; access control policy; conflict analysis; conflict resolution; policy conflict;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Theory and Information Security (ICITIS), 2010 IEEE International Conference on
Conference_Location
Beijing
Print_ISBN
978-1-4244-6942-0
Type
conf
DOI
10.1109/ICITIS.2010.5689459
Filename
5689459
Link To Document