Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010 - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

Expressive policy analysis with enhanced system dynamicity

R Craven, J Lobo, J Ma, A Russo, E Lupu… - Proceedings of the 4th …, 2009 - dl.acm.org
Despite several research studies, the effective analysis of policy based systems remains a
significant challenge. Policy analysis should at least (i) be expressive (ii) take account of …

PTaCL: A language for attribute-based access control in open systems

J Crampton, C Morisset - Principles of Security and Trust: First …, 2012 - Springer
Many languages and algebras have been proposed in recent years for the specification of
authorization policies. For some proposals, such as XACML, the main motivation is to …

Rumpole: a flexible break-glass access control model

S Marinovic, R Craven, J Ma, N Dulay - … of the 16th ACM symposium on …, 2011 - dl.acm.org
Access control operates under the assumption that it is possible to correctly encode and
predict all subjects' needs and rights. However, in human-centric pervasive domains, such …

[HTML][HTML] The logic of XACML

CDPK Ramli, HR Nielson, F Nielson - Science of Computer Programming, 2014 - Elsevier
We study the international standard XACML 3.0 for describing security access control
policies in a compositional way. Our main contributions are (i) to derive a logic that precisely …

Access control via Belnap logic: Intuitive, expressive, and analyzable policy composition

G Bruns, M Huth - ACM Transactions on Information and System Security …, 2011 - dl.acm.org
Access control to IT systems increasingly relies on the ability to compose policies. Hence
there is benefit in any framework for policy composition that is intuitive, formal (and so …

D-algebra for composing access control policy decisions

Q Ni, E Bertino, J Lobo - Proceedings of the 4th International Symposium …, 2009 - dl.acm.org
This paper proposes a D-algebra to compose decisions from multiple access control
policies. Compared to other algebra-based approaches aimed at policy composition, D …

Towards an access-control framework for countering insider threats

J Crampton, M Huth - Insider Threats in Cyber Security, 2010 - Springer
As insider threats pose very significant security risks to IT systems, we ask what policy-based
approaches to access control can do for the detection, mitigation or countering of insider …

[PDF][PDF] Exploiting privacy policy conflicts in online social networks

A Yamada, THJ Kim, A Perrig - CMU-CyLab-12–005, 2012 - Citeseer
ABSTRACT Online Social Networks (OSNs) offer access control mechanisms to protect
users' sensitive information from undesired accesses. Yet, their information is still vulnerable …

The logic of XACML

CDP Kencana Ramli, HR Nielson, F Nielson - International Workshop on …, 2011 - Springer
We study the international standard XACML 3.0 for describing security access control policy
in a compositional way. Our main contribution is to derive a logic that precisely captures the …