Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A propositional policy algebra for access control
Wijesekera D., Jajodia S. ACM Transactions on Information and System Security6 (2):286-325,2003.Type:Article
Date Reviewed: May 29 2003

The authors of this paper demonstrate a comprehensive framework to compose, analyze, and handle complex access control policy as algebra of abstracted symbols that are independent of security policy models and implementation. The algebra includes a complete set of operators, including union, conjunction, difference, negation, scoping, provisioning, sequential composition, completion, and conflict resolution, to effectively describe manipulation with access control policies of different kinds. The policies, as elements of the algebra, are defined as non-deterministic transformers on permission set assignments to subjects, where permission sets are interpreted as collections of the (object, action) pairs. Therefore, complicated security environments with their enforcement mechanisms can be modeled in terms of this approach.

Comprehensive theoretical analysis of the operators is the focus of this paper, which provides practical algebraic rules to determine cases when two policies are equivalent.

Such valuable features of composed policies as completeness, consistency, and determinism are also explored in depth. As a result, the authors present efficient methods that allow effective policy expressions and condition identification when composed policies preserve their consistency, completeness, or determinism.

The proposed framework equips software engineers with the ability to construct complex access control policies from simple atomic policies, and provides a universal approach to compare and reuse already existing policies. Developers of security and protection technologies also will benefit from reading this paper.

Reviewer:  Kirill Rezchikov Review #: CR127674 (0309-0926)
Bookmark and Share
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security, Integrity, And Protection": Date
Security of random data perturbation methods
Muralidhar K., Sarathy R. ACM Transactions on Database Systems 24(4): 487-493, 1999. Type: Article
Apr 1 2000
Towards a configurable security architecture
Olivier M. Data Engineering 38(2): 121-145, 2001. Type: Article
Apr 17 2002
Perturbing nonnormal confidential attributes: the copula approach
Sarathy R., Muralidhar K., Parsa R. Management Science 48(12): 1613-1627, 2002. Type: Article
Jul 2 2003
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy