Paper Title:
Security Policy Conflict Detection for Distributed System
  Abstract

Distributed applications require integrating security policies of collaborating parties, and the policies must be able to support complex authorization specifications and conflicts of policies must be able to be detected. In this paper, we introduce a policy for fine-grained access control which is able to support the specifications with sufficient policy constraints, and then we present a methodology based on semantics to detect whether there are policy conflicts and then produce the XACML policy document.

  Info
Periodical
Advanced Materials Research (Volumes 282-283)
Chapter
Chapter 1: Material Engineering, Chemistry, Bioinformatics
Edited by
Helen Zhang and David Jin
Pages
173-176
DOI
10.4028/www.scientific.net/AMR.282-283.173
Citation
A. J. Zhang, C. Ji, J. Wang, "Security Policy Conflict Detection for Distributed System", Advanced Materials Research, Vols. 282-283, pp. 173-176, 2011
Online since
July 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Tao Peng, Ming Hua Jiang, Ming Hu
Abstract:A multi-policy access control model is proposed, with the model, access control based on policy regulation and XML based policy description...
970
Authors: Ai Juan Zhang, Jing Xiang Gao, Cheng Ji
Abstract:Distributed applications often require integrating security policies of collaborating parties. The integration must be able to support...
848
Authors: Jie Zhou, Qing Guo Shen, Yu Dong Xu, Zhen Wei Yu
Chapter 5: Control Theory and Control Engineering
Abstract:Policy-based management technology which is used for managing enterprise-wide networks and distributed systems is getting more and more...
955
Authors: Yan Ming Cao, Li Pan
Chapter 2: Electronics and Communication
Abstract:Since the original CIM-SPL policy language does not support access control policy, the CIM-SPL is extended with the RBAC model in this paper....
126
Authors: Jian Shi, Song Deng, Wei Min Lin, Tao Zhang, Yuan Yuan Ma, Wei Wei Li
Chapter 13: Software Development and Application
Abstract:The firewall is one of the most important network security facility and is widely used as a base infrastructure in a large enterprise...
1597