Publication | Closed Access
An attribute-based authorization policy framework with dynamic conflict resolution
46
Citations
20
References
2010
Year
Unknown Venue
Authentication AuthorizationEngineeringInformation SecurityPolicy-based Authorization SystemsAuthorizationFormal VerificationLogical Access ControlAccess ControlSystems EngineeringMechanism DesignData PrivacyPolicy Combination AlgorithmsComputer ScienceDynamic Conflict ResolutionData SecurityCryptographyAuthorization SystemFormal MethodsAuthentication Access ControlComputer Security ModelAuthorization Policies
Policy-based authorization systems are becoming more common as information systems become larger and more complex. In these systems, to authorize a requester to access a particular resource, the authorization system must verify that the policy authorizes the access. The overall authorization policy may consist of a number of policy groups, where each group consists of policies defined by different entities. Each policy contains a number of authorization rules. The access request is evaluated against these policies, which may produce conflicting authorization decisions. To resolve these conflicts and to reach a unique decision for the access request at the rule and policy level, rule and policy combination algorithms are used. In the current systems, these rule and policy combination algorithms are defined on a static basis during policy composition, which is not desirable in dynamic systems with fast changing environments.
| Year | Citations | |
|---|---|---|
Page 1
Page 1