Elimination of policy conflict to improve the PDP evaluation performance

F Deng, LY Zhang - Journal of Network and Computer Applications, 2017 - Elsevier
In the authorization access control model, the Policy Decision Point (PDP) may make an
inappropriate authorization decision or the operating efficiency of the network and …

Packet: a privacy-aware access control policy composition method for services composition in cloud environments

L Lin, J Hu, J Zhang - Frontiers of Computer Science, 2016 - Springer
Combining different independent cloud services must coordinate their access control
policies. Otherwise unauthorized access to composite cloud service can occur when …

Role-based access control administration of security policies and policy conflict resolution in distributed systems

SS Kibwage - 2015 - search.proquest.com
Security models using access control policies have over the years improved from Role-
based access control (RBAC) to newer models which have added some features like …

Modeling, conflict detection, and verification of a new virtualization role‐based access control framework

Y Luo, C Xia, L Lv, Z Wei, Y Li - Security and Communication …, 2015 - Wiley Online Library
In the last 10 years, virtualization has become a widespread technique in cloud computing;
however, few of the access control models have ever addressed the security issue of multi …

Fine‐grained filtering to provide access control for data providing services within collaborative environments

K Brown, M Hayes, D Allison… - Concurrency and …, 2015 - Wiley Online Library
A data providing service (DPS) in service‐oriented architecture is tasked only with the
retrieval of data that are annotated over a domain ontology. One particular motivating …

VRBAC: An Extended RBAC Model for Virtualized Environment and Its Conflict Checking Approach

Y Luo, Y Li, Q Tang, Z Wei, C Xia - … ICoC 2013, Zhangjiajie, China, July 10 …, 2013 - Springer
This paper extends RBAC's authorizing ability via adding domain and virtual machine
features aiming at applying in the virtualized scenarios. We define a new model named …

A verification method of enterprise network reachability based on topology path

Y Li, Y Luo, Z Wei, C Xia, X Liang - 2013 Ninth International …, 2013 - ieeexplore.ieee.org
The enlargement of the current enterprise network scale makes the conflict between
application systems and network devices inevitable. To address this issue, this paper …

An ASP Based Approach of Inter-Domain Role Mapping

W Zhang, ZQ Lin - Advanced Materials Research, 2013 - Trans Tech Publ
Although the ANSI RBAC model has achieved great success in the enterprise, it provides no
mechanism for the urgent interoperation needs between distributed domains. This paper …