Pełnotekstowe zasoby PLDML oraz innych baz dziedzinowych są już dostępne w nowej Bibliotece Nauki.
Zapraszamy na https://bibliotekanauki.pl

PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2002 | 12 | 2 | 269-275

Tytuł artykułu

Application of deontic logic in Role-Based Access Control

Treść / Zawartość

Warianty tytułu

Języki publikacji

EN

Abstrakty

EN
The paper presents a short overview of the foundations of the Role-Based Access Control Modal Model and its properties. In particular, the translation of these model formulae to the first-order logic formulae in a form of Horn's clauses is analysed. The automation of processes and mechanisms related to access control on the basis of logical automated reasoning and the PROLOG language are described.

Rocznik

Tom

12

Numer

2

Strony

269-275

Opis fizyczny

Daty

wydano
2002
otrzymano
2001-06-26
poprawiono
2002-01-28

Twórcy

  • Institute of Control and Systems Engineering, Technical University of Wrocław, ul. Wybrzeże S. Wyspiańskiego 27, 50-370 Wrocław, Poland

Bibliografia

  • Barkley J., Cincotta A., Ferraiolo D., Gavrilla S. and Kuhn R. (1997): Role based access control for the World Wide Web. - Proc. NIST-NSA Nat. Computer Security Conf., Baltimore, pp. 23-34.
  • Bolc L., Dziewicki K., Rychlik P., Szałas A. (1995): Reasoning in Non-Classical Logic. Theoretical Basis. - Warsaw: Akademicka Oficyna Wydawnicza PLJ.
  • Bolc L., Dziewicki K., Rychlik P., Szałas A. (1998): Reasoning in Non-Classical Logic. Reasoning Automation. - Warsaw: Akademicka Oficyna Wydawnicza PLJ.
  • Chen F., Sandhu R.S. (1996): Constraints for role-based access control. - Proc. ACM Workshop on RBAC, Gaithersburg, USA, pp. 382-390.
  • CCIB (1999): Common criteria for information technology security evaluation, Ver. 2.1. - Common Criteria Implementation Board-99-01.
  • Denning D.E. (1982): Cryptography and Data Security. -Massachusetts: Addison-Wesley.
  • Ferraiolo D., Barkley F. (1997): Specifying and managing role-based access control within a corporate Intranet. - Proc. 2nd ACM Workshop on RBAC, Fairfax, USA, pp. 69-78.
  • Kołaczek G. (2001): Model of role based access control mechanism. -Ph. D. thesis, Technical University of Wrocław, Wrocław, Poland.
  • Mally E. (1926): Grundgesetze des Sollens. Elemente der Logik des Willens. -Graz: Leuschner and Lubensky.
  • NCSC (1985): Trusted Computer Security Evaluation Criteria. - National Computer Security Centre, DOD 5200.28-STD.
  • Sandhu R. (1992): Lattice-based enforcement of chinese walls. - Comp. Security, Vol. 11, No. 8, pp. 753-763.
  • Sandhu R. (1996): Role hierarchies and constraints for lattice-based access controls. -Proc. 4-th Europ. Symp. Research in Computer Security, Rome, Italy, pp. 20-25.
  • Sandhu R. (1997): Rationale for the RBAC96 family of access control models. -Proc. 1st ACM Workshop Role-Based Access Control, Gaithersburg, USA, pp. 32-38.
  • Sandhu R. (1998): Role activation hierarchies. - Proc. 3-rd ACM Workshops Role-Based Access Control, Fairfax, USA, pp. 56-65.
  • Sandhu R, Bhamidipati V., Coyne E., Ganta S, Youman Ch. (1997): The ARBAC97 model for role-based administration of roles: Preliminary description and outline. - Proc. 2nd ACM Workshop Role-Based Access Control, Fairfax, USA, pp. 41-50.
  • Sandhu R, Bhamidipati V., Munawer Q. (1999): The ARBAC97 model for role-based administration of roles. - ACM Trans. Inf. Syst. Secur., Vol. 2, No. 1, pp. 105-135.
  • Sandhu R.S., Coyne E.J., Feinstein H. L., Youman Ch.E. (1994): Role-based access control: A multi-dimensional view. - Proc. 10-ths Annual Computer Security Application Conf., Greater Orlando, USA, pp. 54-62.
  • Shirey R. (2000): Request for Comments 2828. - The Internet Society, available at http://www.rfceditor.org.rfc.html
  • von Wright G.H. (1951): Deontic logic. - Mind, Vol. 60, No. 237, pp. 1-15.

Typ dokumentu

Bibliografia

Identyfikatory

Identyfikator YADDA

bwmeta1.element.bwnjournal-article-amcv12i2p269bwm
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.