@inproceedings{cf7082b1852d4fe0960f3da9559a07f8,
title = "A conflict-related rules detection tool for access control policy",
abstract = "Conflict detection is an important issue of the Access Control Policy. Most conflict detection tools mainly focus on the two rules that have contrary actions, but there are also other rules which are necessary to the conflict situation, which is not considered in these tools. This paper defines all these rules related to the conflict situation as the concept {"}conflict-related rules{"}, and gives a conflict-related rules detection tool for Access Control Policy which can report the conflict situation more comprehensively. By giving the semantics model of the access control policy and the definition of conflict, we prove the necessary and sufficient condition of conflict, and then give the concept of {"}conflict-related rules{"} and deduce its extension. We implement conflict-related rules detection tool based on the description logic, and the experiment results validate the tool's correctness and effectiveness. The results of the correctness experiment showed that instead of detecting the two rules with opposite actions only, it detected all the conflict-related rules for access control policy; the results of the effectiveness experiment showed that our tool's response performance is better than VPN based tools.",
keywords = "Access control policy, Conflict detect, Conflict-related rules, Description logic",
author = "Xiaoyan Liang and Liangshuang Lv and Chunhe Xia and Yang Luo and Yazhuo Li",
year = "2013",
doi = "10.1007/978-3-642-53959-6\_15",
language = "英语",
isbn = "9783642539589",
series = "Communications in Computer and Information Science",
publisher = "Springer Verlag",
pages = "158--169",
booktitle = "Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Revised Selected Papers",
address = "德国",
note = "2nd CCF Internet Conference of China, ICoC 2013 ; Conference date: 10-07-2013 Through 10-07-2013",
}