Affiliation:
1. Computer Science and Engineering Department, University of South Carolina, Columbia, SC, USA
Abstract
In collaborative environments where resources must be shared across multiple sites, the access control policies of the participants must be combined in order to define a coherent policy. The relevant challenge in composing access policies is to deal with inconsistencies or modality conflicts. This difficulty exacerbates when the policies to compose are specified independently by different entities with no global power to decide in case of conflicts which entity must take precedence. This paper presents a semi-automated framework called Policy Composition and Conflict Resolution framework (P2CR) to address this issue. They focus on access control policies expressed as XACML statements. The authors propose a three-level conflicts resolution strategy: i) by using metadata added to the policies, ii) by using a defeasible logic theory, and iii) by providing recommendations to the entities owners of the resources. First, they provide a mechanism to add metadata to XACML. Second, they combine the access policies without prioritizing any of the entities involved in the composition. Given the context of the authors’ work, they consider this approach to be more suitable than the current approaches that are mainly negotiation-oriented or assign priorities to the policies. Finally, the resulting composite policy appears flexible and easily adjustable to runtime conflicts.
Reference27 articles.
1. Agrawal, D., Giles, J., Lee, K., & Lobo, J. (2007, June). Policy ratification. In Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks.
2. Backes, M., Karjoth, G., Bagga, W., & Schunter, M. (2004, June). Efficient comparison of enterprise privacy policies. In Proceedings of the ACM Symposium on Applied Computing (pp. 223-232).
3. Bertolissi, C., & Fernandez, M. (2008, July). A rewriting framework for the composition of access control policies. In Proceedings of the 10th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming (pp. 217-225).
4. Bonatti, P., Vimercati, S., De Capitani, D., & Samarati, P. (2000). A modular approach to composing access control policies. In Proceedings of the 7th ACM Conference on Computer and Communications Security (pp. 164-173).
5. Bruns, G., Dantas, D. S., & Huth, M. (2007, November). A simple and expressive semantic framework for policy composition in access control. In Proceedings of the ACM Workshop on Formal Methods in Security Engineering (pp. 12-21).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献