Research on multilevel security access control policy processing method
Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical rel...
Saved in:
Published in | IET Conference Proceedings |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
Stevenage
The Institution of Engineering & Technology
14.11.2014
|
Online Access | Get full text |
DOI | 10.1049/cp.2014.1284 |
Cover
Abstract | Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical relations between subjects and objects in multilevel security access control systems, this paper gives a method to build a unified directed acyclic graph(DAG) model (including both subjects and objects), using the partial orders based on sets. This method is easier to realize and is more utility for designing the access control model. Also based on partially ordered set, this paper proposes the algorithms for detecting policy conflicts and incomplete policies, which is embedding in the process of building DAG model. In the end, this paper verifies the correctness of the algorithm by experiment. |
---|---|
AbstractList | Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical relations between subjects and objects in multilevel security access control systems, this paper gives a method to build a unified directed acyclic graph(DAG) model (including both subjects and objects), using the partial orders based on sets. This method is easier to realize and is more utility for designing the access control model. Also based on partially ordered set, this paper proposes the algorithms for detecting policy conflicts and incomplete policies, which is embedding in the process of building DAG model. In the end, this paper verifies the correctness of the algorithm by experiment. |
Author | Wang, Junshe Liu, Shengjuan Zhang, Hongbin Chang, Jiang |
Author_xml | – sequence: 1 givenname: Junshe surname: Wang fullname: Wang, Junshe – sequence: 2 givenname: Shengjuan surname: Liu fullname: Liu, Shengjuan – sequence: 3 givenname: Hongbin surname: Zhang fullname: Zhang, Hongbin – sequence: 4 givenname: Jiang surname: Chang fullname: Chang, Jiang |
BookMark | eNotjk9LAzEUxHPQg1ZvfoCA5615-bObPUrRKhQE0XN5vn21K2mybrJCv70r9jAMDD9m5lKcxRRZiBtQS1C2vaNhqRXYJWhvL8T6lTPjSHuZojxMofSBfzjIzDSNfTlKJOKcJaVYxhTkkEJPRzmM6S_u46c8cNmn7kqc7zBkvj75Qrw_PrytnqrNy_p5db-pejC2VOjBEDZ13c5yyu_YGOQOFKFvsHWNcho77T6cshqcBt0B-nbmCLRDMgtx-987P_ieOJftV5rGOE9uoWlqWytfW_MLUM9IxQ |
ContentType | Conference Proceeding |
Copyright | Copyright The Institution of Engineering & Technology Nov 14, 2014 |
Copyright_xml | – notice: Copyright The Institution of Engineering & Technology Nov 14, 2014 |
DBID | 8FE 8FG AAFGM ABJCF ABQRF ABRGS AFKRA AFLLJ AFOKG AFOLM AGAJT ANJRB AQTIP ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQCXX PQEST PQGLB PQQKQ PQUKI PTHSS |
DOI | 10.1049/cp.2014.1284 |
DatabaseName | ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central Korea - hybrid linking Materials Science & Engineering Collection Technology Collection - hybrid linking Materials Science & Engineering Collection - hybrid linking ProQuest Central UK/Ireland SciTech Premium Collection - hybrid linking Advanced Technologies & Aerospace Collection - hybrid linking ProQuest Central Student - hybrid linking ProQuest Central Essentials - hybrid linking Computer Science Database - hybrid linking ProQuest Women's & Gender Studies - hybrid linking Advanced Technologies & Aerospace Collection ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Engineering Collection Engineering Database ProQuest advanced technologies & aerospace journals ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest Central - hybrid linking ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition Engineering collection |
DatabaseTitle | Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Computer Science Database |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
ExternalDocumentID | 4002740741 |
GroupedDBID | 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PTHSS |
ID | FETCH-LOGICAL-i134t-a813ca7669766508fe33aed10ca87a957052ad25b504215212d1a898fec125ac3 |
IEDL.DBID | BENPR |
IngestDate | Mon Jun 30 10:06:05 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i134t-a813ca7669766508fe33aed10ca87a957052ad25b504215212d1a898fec125ac3 |
Notes | ObjectType-Article-1 ObjectType-Feature-2 SourceType-Conference Papers & Proceedings-1 content type line 22 |
PQID | 1776460864 |
PQPubID | 1936365 |
ParticipantIDs | proquest_journals_1776460864 |
PublicationCentury | 2000 |
PublicationDate | 20141114 |
PublicationDateYYYYMMDD | 2014-11-14 |
PublicationDate_xml | – month: 11 year: 2014 text: 20141114 day: 14 |
PublicationDecade | 2010 |
PublicationPlace | Stevenage |
PublicationPlace_xml | – name: Stevenage |
PublicationTitle | IET Conference Proceedings |
PublicationYear | 2014 |
Publisher | The Institution of Engineering & Technology |
Publisher_xml | – name: The Institution of Engineering & Technology |
Score | 1.5610986 |
Snippet | Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel... |
SourceID | proquest |
SourceType | Aggregation Database |
Title | Research on multilevel security access control policy processing method |
URI | https://www.proquest.com/docview/1776460864 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFH7sx8Wb4sQfc-Tgta5p0iY9iKDsBx7GEAe7jdckBUG66er_70uXuoPgtS2BPpLvfUm-9z6AO3pOEIg6ik3pj25og1JoWleJKFPLMUZ9EMgusvlKvqzTdQcWbS2Ml1W2mNgAtd0af0Y-5kplMiMCLh93n5F3jfK3q62FBgZrBfvQtBjrQp8gWdO87z9NFsvXoHgnNjw2vkkll_cel__gb5NUpqcwOJbbseVvIjmDjqvOYdZq4ti2Yo3s78Pre9g-GM4xbKwOWdCas13T4JftDsJ_GocdzKEHsJpO3p7nUXA9iN65kHWEmguDKsuIKHj6VDoh0FkeG9QK81TFaYI2SYuU1pvPvgnFVOf0nSGygkZcQK_aVu4SmE5cQQyGhrGlNHmCjsgh8QWrYqtU6a5g2P7_Jkzd_eYY6Ov_X9_AiY-kL8zjcgi9-uvb3VKGrosRdPV0NgrB_wGZi5Wh |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07T8MwED6VMsAGoohHAQ8whsaPxM6AGIA-aKkYWqlbcRxHQqrSQosQf4rfyDkPOiCxdY2jU-yz7z473_kDuMTnGAK18nyTuqMb3KDECtcV42mQUO1rVRBkh2F3LB4nwaQG31UtjKNVVjExD9TJ3Lgz8haVMhQhAnBxu3jznGqU-7taSWgU06Jvvz5xy7a86d2jf68Yaz-M7rpeqSrgvVIuVp5WlBstwxATsYMnqeVc24T6Riupo0D6AdMJC-IA57PLbgy_WUX4nkEwoA1Hu1uwLTiPnFSEandKPj1i7ZZxV2BSce2i_p_onqes9h401sV85Pk3Te1DzWYH0KkYd2SekZxUOHPsIbIs5eyIzoUUSclkJ4v8-mCyKMoK0A4ppKcbMN5I7w-hns0zewREMRsjPkIzSSpMxLRF6IloJJF-ImVqj6FZ9X9aLozldO3Gk_-bL2CnO3oaTAe9Yf8Udt2ouhJAKppQX71_2DPEAqv4PHcAgZdNe_wHzmDJlA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IET+Conference+Proceedings&rft.atitle=Research+on+multilevel+security+access+control+policy+processing+method&rft.au=Wang%2C+Junshe&rft.au=Liu%2C+Shengjuan&rft.au=Zhang%2C+Hongbin&rft.au=Chang%2C+Jiang&rft.date=2014-11-14&rft.pub=The+Institution+of+Engineering+%26+Technology&rft_id=info:doi/10.1049%2Fcp.2014.1284&rft.externalDocID=4002740741 |