A conflict-related rules detection tool for access control policy

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Conflict detection is an important issue of the Access Control Policy. Most conflict detection tools mainly focus on the two rules that have contrary actions, but there are also other rules which are necessary to the conflict situation, which is not considered in these tools. This paper defines all these rules related to the conflict situation as the concept "conflict-related rules", and gives a conflict-related rules detection tool for Access Control Policy which can report the conflict situation more comprehensively. By giving the semantics model of the access control policy and the definition of conflict, we prove the necessary and sufficient condition of conflict, and then give the concept of "conflict-related rules" and deduce its extension. We implement conflict-related rules detection tool based on the description logic, and the experiment results validate the tool's correctness and effectiveness. The results of the correctness experiment showed that instead of detecting the two rules with opposite actions only, it detected all the conflict-related rules for access control policy; the results of the effectiveness experiment showed that our tool's response performance is better than VPN based tools.

Original languageEnglish
Title of host publicationFrontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Revised Selected Papers
PublisherSpringer Verlag
Pages158-169
Number of pages12
ISBN (Print)9783642539589
DOIs
StatePublished - 2013
Event2nd CCF Internet Conference of China, ICoC 2013 - Zhangjiajie, China
Duration: 10 Jul 201310 Jul 2013

Publication series

NameCommunications in Computer and Information Science
Volume401
ISSN (Print)1865-0929

Conference

Conference2nd CCF Internet Conference of China, ICoC 2013
Country/TerritoryChina
CityZhangjiajie
Period10/07/1310/07/13

Keywords

  • Access control policy
  • Conflict detect
  • Conflict-related rules
  • Description logic

Fingerprint

Dive into the research topics of 'A conflict-related rules detection tool for access control policy'. Together they form a unique fingerprint.

Cite this