نتایج جستجو برای: Access Control Policies

تعداد نتایج: 1702974  

Journal: :isecure, the isc international journal of information security 0
m. safarzadeh m. taghizadeh b. zamani b. tork ladani

one of the main requirements for providing software security is the enforcement of access control policies, which is sometimes referred to as the heart of security. the main purpose of access control policies is to protect resources of the system against unauthorized accesses. any error in the implementation of access control policies may lead to undesirable outcomes. hence, we should ensure th...

2007
Sabrina De Capitani di Vimercati Sara Foresti Pierangela Samarati Sushil Jajodia

Access control is the process of mediating every request to data and services maintained by a system and determining whether the request should be granted or denied. Expressiveness and flexibility are top requirements for an access control system together with, and usually in conflict with, simplicity and efficiency. In this paper, we discuss the main desiderata for access control systems and i...

B. Tork Ladani B. Zamani M. Safarzadeh M. Taghizadeh

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

Journal: :Journal of information security and applications 2022

Organizations undertake complex and costly projects to model high-quality Access Control Policies (ACPs). Once built, these policies must be maintained managed in an ongoing process keep their quality high. Insufficient maintenance leads inaccurate authorization decisions increases the policies’ administrative effort susceptibility errors. While initial modeling of ACPs has received significant...

2012
Akshay Patil B. B. Meshram

As organizations increase their dependence on database systems for daily business, they become more vulnerable to security breaches even as they gain productivity and efficiency advantages. A truly comprehensive approach for data protection must include mechanisms for enforcing access control policies based on data contents, subject qualifications and characteristics. The database security comm...

2009
JeeHyun Hwang Evan Martin Tao Xie Vincent C. Hu

As software systems become more and more complex, and are deployed to manage a large amount of sensitive information and resources, specifying and managing correct access control policies is critical and yet challenging. Policy testing is an important means to increasing confidence in the correctness of specified policies and their implementations for access control. There are two types of poli...

One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...

Journal: :Advanced Information Systems 2021

Journal: :Electr. Notes Theor. Comput. Sci. 2007
Anderson Santana de Oliveira

In this paper we propose a formalization of access control policies based on term rewriting. The state of the system to which policies are enforced is represented as an algebraic term, what allows to model many aspects of the policy environment. Policies are represented as sets of rewrite rules, whose evaluation produces deterministic authorization decisions. We discuss the relation between pro...

2004
Dimitar P. Guelev Mark Ryan Pierre-Yves Schobbens

We present a model of access control which provides finegrained data-dependent control, can express permissions about permissions, can express delegation, and can describe systems which avoid the root-bottleneck problem. We present a language for describing goals of agents; these goals are typically to read or write the values of some resources. We describe a decision procedure which determines...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید