[PDF][PDF] Modeling and combining access control policies using constrained policy graph (CPG)

Z Derakhshandeh, BT Ladani… - Journal of Applied …, 2008 - academia.edu
In this study, a formal model for specification of Access Control Policies (ACP) is
represented. This model is capable of expressing several ACPs and combining them in a
unified framework. We call present model Constrained Policy Graph (CPG), which is an
extension of Take-Grant (TG) protection model. Although TG can be used to specify the
ACPs but it represents the policies without any constraint (eg, time, location, or any other
restriction parameters). Furthermore, it hasn't ever been used for combining the policies and …
以上显示的是最相近的搜索结果。 查看全部搜索结果