Automated decomposition of access control policies

Linying Su, David W. Chadwick, Andrew Basden, James A. Cunningham

Research output: Contribution to conferencePaperpeer-review

Abstract

Modern dynamic distributed information systems need access control policies to address controlling access to multiple resources that are distributed. The resources may be considered as a single abstract hierarchical resource. An access control policy at a high level should be able to define who is allowed to use the resources. At lower levels, the policy will address controlling access to concrete resources, By modelling the resource hierarchy, it is possible that low level policies can be automatically produced from the high level policy. These low level policies can then be distributed to the concrete resources that use an existing policy based access control decision system so that the high level policy can be enforced throughout the system. In this paper a model for representing and refining high level policies is presented. Other relevant issues and examples for demonstrating the capability of the policy decomposition (refinement) process are also presented.
Original languageEnglish
Pages1-11
Number of pages11
DOIs
Publication statusPublished - 27 Jun 2005
Event6th IEEE International Workshop on Policies for Distributed Systems and Networks - Stockholm, Sweden
Duration: 6 Jun 20058 Jun 2005

Conference

Conference6th IEEE International Workshop on Policies for Distributed Systems and Networks
Abbreviated titlePOLICY'05
Country/TerritorySweden
CityStockholm
Period6/06/058/06/05

Keywords

  • access control
  • decision making
  • concrete
  • automatic control
  • authorization
  • laboratories
  • distributed information systems
  • control systems
  • secrity
  • internet

Fingerprint

Dive into the research topics of 'Automated decomposition of access control policies'. Together they form a unique fingerprint.

Cite this