Designing Access Control Policy Using Formal Concept Analysis

Article Preview

Abstract:

The need to securely share information among collaborating entities is increasingly becoming important. It often needed to implement access control (AC) models. The objective of this paper is to design access control policy using formal concept analysis, which is based on mathematical lattice and order theory. We provide discussion on how FCA can be used to capture RBAC constraints. We show with FCA, we can express more intend constrains than it can be done in traditional RBAC approach. The experimental results show that the approach is more resilient to dynamic computer environment.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3822-3825

Citation:

Online since:

August 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chen, Bo, and Lingna He. An Extensible Framework for RBAC in Dynamic Ad-Hoc Coalitions., Network Computing and Information Security (NCIS), 2011 International Conference on. Vol. 1. IEEE, (2011).

DOI: 10.1109/ncis.2011.12

Google Scholar

[2] Schlegelmilch, Jürgen, and Ulrike Steffens. Role mining with ORCA., Proceedings of the tenth ACM symposium on Access control models and technologies. ACM, (2005).

DOI: 10.1145/1063979.1064008

Google Scholar

[3] Vaidya, Jaideep, Vijayalakshmi Atluri, and Janice Warner. RoleMiner: mining roles using subset enumeration., Proceedings of the 13th ACM conference on Computer and communications security. ACM, (2006).

DOI: 10.1145/1180405.1180424

Google Scholar

[4] Molloy, Ian, et al. Mining roles with semantic meanings., Proceedings of the 13th ACM symposium on Access control models and technologies. ACM, (2008).

DOI: 10.1145/1377836.1377840

Google Scholar

[5] Zhang, Dana, Kotagiri Ramamohanarao, and Tim Ebringer. Role engineering using graph optimisation., Proceedings of the 12th ACM symposium on Access control models and technologies. ACM, (2007).

DOI: 10.1145/1266840.1266862

Google Scholar

[6] Takabi, Hassan, and James BD Joshi. StateMiner: An efficient similarity-based approach for optimal mining of role hierarchy., Proceedings of the 15th ACM symposium on Access control models and technologies. ACM, (2010).

DOI: 10.1145/1809842.1809853

Google Scholar