Research on multilevel security access control policy processing method

Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical rel...

Full description

Saved in:
Bibliographic Details
Published inIET Conference Proceedings
Main Authors Wang, Junshe, Liu, Shengjuan, Zhang, Hongbin, Chang, Jiang
Format Conference Proceeding
LanguageEnglish
Published Stevenage The Institution of Engineering & Technology 14.11.2014
Online AccessGet full text
DOI10.1049/cp.2014.1284

Cover

Abstract Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical relations between subjects and objects in multilevel security access control systems, this paper gives a method to build a unified directed acyclic graph(DAG) model (including both subjects and objects), using the partial orders based on sets. This method is easier to realize and is more utility for designing the access control model. Also based on partially ordered set, this paper proposes the algorithms for detecting policy conflicts and incomplete policies, which is embedding in the process of building DAG model. In the end, this paper verifies the correctness of the algorithm by experiment.
AbstractList Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel security access control can be legally enforced, the access control policies must be correct and complete. Based on the implicit hierarchical relations between subjects and objects in multilevel security access control systems, this paper gives a method to build a unified directed acyclic graph(DAG) model (including both subjects and objects), using the partial orders based on sets. This method is easier to realize and is more utility for designing the access control model. Also based on partially ordered set, this paper proposes the algorithms for detecting policy conflicts and incomplete policies, which is embedding in the process of building DAG model. In the end, this paper verifies the correctness of the algorithm by experiment.
Author Wang, Junshe
Liu, Shengjuan
Zhang, Hongbin
Chang, Jiang
Author_xml – sequence: 1
  givenname: Junshe
  surname: Wang
  fullname: Wang, Junshe
– sequence: 2
  givenname: Shengjuan
  surname: Liu
  fullname: Liu, Shengjuan
– sequence: 3
  givenname: Hongbin
  surname: Zhang
  fullname: Zhang, Hongbin
– sequence: 4
  givenname: Jiang
  surname: Chang
  fullname: Chang, Jiang
BookMark eNotjk9LAzEUxHPQg1ZvfoCA5615-bObPUrRKhQE0XN5vn21K2mybrJCv70r9jAMDD9m5lKcxRRZiBtQS1C2vaNhqRXYJWhvL8T6lTPjSHuZojxMofSBfzjIzDSNfTlKJOKcJaVYxhTkkEJPRzmM6S_u46c8cNmn7kqc7zBkvj75Qrw_PrytnqrNy_p5db-pejC2VOjBEDZ13c5yyu_YGOQOFKFvsHWNcho77T6cshqcBt0B-nbmCLRDMgtx-987P_ieOJftV5rGOE9uoWlqWytfW_MLUM9IxQ
ContentType Conference Proceeding
Copyright Copyright The Institution of Engineering & Technology Nov 14, 2014
Copyright_xml – notice: Copyright The Institution of Engineering & Technology Nov 14, 2014
DBID 8FE
8FG
AAFGM
ABJCF
ABQRF
ABRGS
AFKRA
AFLLJ
AFOKG
AFOLM
AGAJT
ANJRB
AQTIP
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQCXX
PQEST
PQGLB
PQQKQ
PQUKI
PTHSS
DOI 10.1049/cp.2014.1284
DatabaseName ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central Korea - hybrid linking
Materials Science & Engineering Collection
Technology Collection - hybrid linking
Materials Science & Engineering Collection - hybrid linking
ProQuest Central UK/Ireland
SciTech Premium Collection - hybrid linking
Advanced Technologies & Aerospace Collection - hybrid linking
ProQuest Central Student - hybrid linking
ProQuest Central Essentials - hybrid linking
Computer Science Database - hybrid linking
ProQuest Women's & Gender Studies - hybrid linking
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
AUTh Library subscriptions: ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Engineering Collection
Engineering Database
ProQuest advanced technologies & aerospace journals
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest Central - hybrid linking
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
Engineering collection
DatabaseTitle Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
ExternalDocumentID 4002740741
GroupedDBID 8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PTHSS
ID FETCH-LOGICAL-i134t-a813ca7669766508fe33aed10ca87a957052ad25b504215212d1a898fec125ac3
IEDL.DBID BENPR
IngestDate Mon Jun 30 10:06:05 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i134t-a813ca7669766508fe33aed10ca87a957052ad25b504215212d1a898fec125ac3
Notes ObjectType-Article-1
ObjectType-Feature-2
SourceType-Conference Papers & Proceedings-1
content type line 22
PQID 1776460864
PQPubID 1936365
ParticipantIDs proquest_journals_1776460864
PublicationCentury 2000
PublicationDate 20141114
PublicationDateYYYYMMDD 2014-11-14
PublicationDate_xml – month: 11
  year: 2014
  text: 20141114
  day: 14
PublicationDecade 2010
PublicationPlace Stevenage
PublicationPlace_xml – name: Stevenage
PublicationTitle IET Conference Proceedings
PublicationYear 2014
Publisher The Institution of Engineering & Technology
Publisher_xml – name: The Institution of Engineering & Technology
Score 1.5610986
Snippet Access control is one of the most important means to protect the resources of multilevel security systems. So to make sure the authorization of multilevel...
SourceID proquest
SourceType Aggregation Database
Title Research on multilevel security access control policy processing method
URI https://www.proquest.com/docview/1776460864
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFH7sx8Wb4sQfc-Tgta5p0iY9iKDsBx7GEAe7jdckBUG66er_70uXuoPgtS2BPpLvfUm-9z6AO3pOEIg6ik3pj25og1JoWleJKFPLMUZ9EMgusvlKvqzTdQcWbS2Ml1W2mNgAtd0af0Y-5kplMiMCLh93n5F3jfK3q62FBgZrBfvQtBjrQp8gWdO87z9NFsvXoHgnNjw2vkkll_cel__gb5NUpqcwOJbbseVvIjmDjqvOYdZq4ti2Yo3s78Pre9g-GM4xbKwOWdCas13T4JftDsJ_GocdzKEHsJpO3p7nUXA9iN65kHWEmguDKsuIKHj6VDoh0FkeG9QK81TFaYI2SYuU1pvPvgnFVOf0nSGygkZcQK_aVu4SmE5cQQyGhrGlNHmCjsgh8QWrYqtU6a5g2P7_Jkzd_eYY6Ov_X9_AiY-kL8zjcgi9-uvb3VKGrosRdPV0NgrB_wGZi5Wh
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV07T8MwED6VMsAGoohHAQ8whsaPxM6AGIA-aKkYWqlbcRxHQqrSQosQf4rfyDkPOiCxdY2jU-yz7z473_kDuMTnGAK18nyTuqMb3KDECtcV42mQUO1rVRBkh2F3LB4nwaQG31UtjKNVVjExD9TJ3Lgz8haVMhQhAnBxu3jznGqU-7taSWgU06Jvvz5xy7a86d2jf68Yaz-M7rpeqSrgvVIuVp5WlBstwxATsYMnqeVc24T6Riupo0D6AdMJC-IA57PLbgy_WUX4nkEwoA1Hu1uwLTiPnFSEandKPj1i7ZZxV2BSce2i_p_onqes9h401sV85Pk3Te1DzWYH0KkYd2SekZxUOHPsIbIs5eyIzoUUSclkJ4v8-mCyKMoK0A4ppKcbMN5I7w-hns0zewREMRsjPkIzSSpMxLRF6IloJJF-ImVqj6FZ9X9aLozldO3Gk_-bL2CnO3oaTAe9Yf8Udt2ouhJAKppQX71_2DPEAqv4PHcAgZdNe_wHzmDJlA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IET+Conference+Proceedings&rft.atitle=Research+on+multilevel+security+access+control+policy+processing+method&rft.au=Wang%2C+Junshe&rft.au=Liu%2C+Shengjuan&rft.au=Zhang%2C+Hongbin&rft.au=Chang%2C+Jiang&rft.date=2014-11-14&rft.pub=The+Institution+of+Engineering+%26+Technology&rft_id=info:doi/10.1049%2Fcp.2014.1284&rft.externalDocID=4002740741