PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Powiadomienia systemowe
  • Sesja wygasła!
Tytuł artykułu

Application of deontic logic in role-based access control

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model and its properties. In particular, the translation of these model formulae to the first-order logic formulae in a form of Horn's clauses is analysed. The automation of processes and mechanisms related to access control on the basis of logical automated reasoning and the PROLOG language are described.
Twórcy
autor
  • Institute of Control and Systems Engineering, Technical University of Wrocław ul. Wybrzeże S. Wyspianskiego 27, 50-370 Wrocław, Poland
Bibliografia
  • [1] Barkley J., Cincotta A., Ferraiolo D., Gavrilla S. and Kuhn R. (1997): Role based access control for the World Wide Web. - Proc. NIST-NSA Nat. Computer Security Conf., Baltimore, pp. 23-34.
  • [2] Bolc L., Dziewicki K., Rychlik P., Szałas A. (1995): Reasoning in Non-Classical Logic. Theoretical Basis. - Warsaw: Akademicka Oficyna Wydawnicza PLJ.
  • [3] Bolc L., Dziewicki K., Rychlik P., Szałas A. (1998): Reasoning in Non-Classical Logic. Reasoning Automation. - Warsaw: Akademicka Oficyna Wydawnicza PLJ.
  • [4] Chen F., Sandhu R.S. (1996): Constraints for role-based access control. - Proc. ACM Workshop on RBAC, Gaithersburg, USA, pp. 382-390.
  • [5] CCIB (1999): Common criteria for information technology security evaluation, Ver. 2.1. - Common Criteria Implementation Board-99-01.
  • [6] Denning D.E. (1982): Cryptography and Data Security. - Massachusetts: Addison-Wesley.
  • [7] Ferraiolo D., Barkley F. (1997): Specifying and managing role-based access control within a corporate Intranet. - Proc. 2nd ACM Workshop on RBAC, Fairfax, USA, pp. 69-78.
  • [8] Kołaczek G. (2001): Model of role based access control mechanism. - Ph. D. thesis, Technical University of Wrocław, Wrocław, Poland.
  • [9] Mally E. (1926): Grundgesetze des Sollens. Elemente der Logik des Willens. - Graz: Leuschner & Lubensky.
  • [10] NCSC (1985): Trusted Computer Security Evaluation Criteria. - National Computer Security Centre, DOD 5200.28- STD.
  • [11] Sandhu R. (1992): Lattice-based enforcement of chinese walls. - Comp. Security, Vol. 11, No. 8, pp. 753-763.
  • [12] Sandhu R. (1996): Role hierarchies and constraints for lattice-based access controls. - Proc. 4-th Europ. Symp. Research in Computer Security, Rome, Italy, pp. 20-25.
  • [13] Sandhu R. (1997): Rationale for the RBAC96 family of access control models. - Proc. 1st ACM Workshop Role-Based Access Control, Gaithersburg, USA, pp. 32-38.
  • [14] Sandhu R. (1998): Role activation hierarchies. - Proc. 3- rd ACM Workshop Role-Based Access Control, Fairfax, USA, pp. 56-65.
  • [15] Sandhu R, Bhamidipati V., Coyne E., Ganta S, Youman Ch. (1997): The ARBAC97 model for role-based administration of roles: Preliminary description and outline. - Proc. 2nd ACM Workshop Role-Based Access Control, Fairfax, USA, pp. 41-50.
  • [16] Sandhu R, Bhamidipati V., Munawer Q. (1999): The ARBAC97 model for role-based administration of roles. - ACM Trans. Inf. Syst. Secur., Vol. 2, No. 1, pp. 105-135.
  • [17] Sandhu R.S., Coyne E.J., Feinstein H. L., Youman Ch.E. (1994): Role-based access control: A multi-dimensional view. - Proc. 10-th Annual Computer Security Application Conf., Greater Orlando, USA, pp. 54-62.
  • [18] Shirey R. (2000): Request for Comments 2828. - The Internet Society, available at http://www.rfceditor.org.rfc.html.
  • [19] von Wright G.H. (1951): Deontic logic. - Mind, Vol. 60, No. 237, pp. 1-15.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-article-BPZ1-0001-0025
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.