Usage Control Model Based on Regular Grammar

Article Preview

Abstract:

Traditional access control models through search Access Control List(ACL) to authorize [1-3]. Traditional access control models fail to satisfy the modern information system, thus Usage Control( UCON ) models were produced and fundamentally enhanced the traditional access control. The UCON models are considered as the next generation access control models. This paper is organized as follow. Section 1 introduces the Usage Control models. Section 2 introduces Regular Grammar ( RG ). Section 3 gives the RG of the 16 core ABC UCON models. Section 4 gives the RG of on-line antivirus procedure. Finally, section 5 summarizes this paper.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

4590-4596

Citation:

Online since:

January 2012

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Sandhu R, Coyne E, Feinstein H. Role-based access control models,. IEEE Compute, 1996, 29(2): 38-47.

DOI: 10.1109/2.485845

Google Scholar

[2] Osborn S, Sandhu R, Munawer Q. Configuring Role-based access control to enforce mandatory and discretionary access control policies,. ACM Transactions on Information and Systems Security, 2000, 3(2): 85-106.

DOI: 10.1145/354876.354878

Google Scholar

[3] Zhang Xin-wen, Francesco Parisi-Presicce, Sandhu R. Formal Model and PolicySpecification of Usage Control,. ACM Transactions on Information and Systems Security, 2004, 2(4): 111-145.

Google Scholar

[4] Jang Zong-li, Jang Shou-xu, Formal Languages and Automata Theory(The Second Edition), TSINGHUA University Press, (2007).

Google Scholar

[5] Jaehong Park, Sandhu R. The UCONABC Usage Control Model,. ACM Transactions on Information and Systems Security, 2004, 7(1): 128-174.

Google Scholar