Research on multilevel security access control policy processing method
Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical rel...
Saved in:
Published in | IET Conference Proceedings |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
Stevenage
The Institution of Engineering & Technology
14.11.2014
|
Online Access | Get full text |
DOI | 10.1049/cp.2014.1284 |
Cover
Summary: | Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical relations between subjects and objects in multilevel security access control systems, this paper gives a method to build a unified directed acyclic graph(DAG) model (including both subjects and objects), using the partial orders based on sets. This method is easier to realize and is more utility for designing the access control model. Also based on partially ordered set, this paper proposes the algorithms for detecting policy conflicts and incomplete policies, which is embedding in the process of building DAG model. In the end, this paper verifies the correctness of the algorithm by experiment. |
---|---|
Bibliography: | ObjectType-Article-1 ObjectType-Feature-2 SourceType-Conference Papers & Proceedings-1 content type line 22 |
DOI: | 10.1049/cp.2014.1284 |