Skip to main content

On Lattices in Access Control Models

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4068))

Abstract

Lattices have been extensively used for implementing mandatory access control policies. Typically, only a small sublattice of the subset lattice of a certain alphabet is used in applications. We argue that attribute exploration from formal concept analysis is an appropriate tool for generating this sublattice in a semiautomatic fashion. We discuss how two access control models addressing different (in a sense, opposite) requirements can be incorporated within one model. In this regard, we propose two operations that combine contexts of the form (G, M, I) and (N, G, J). The resulting concept lattices provide most of the required structure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sandhu, R.: Lattice-based access control models. IEEE Computer 26, 9–19 (1993)

    Google Scholar 

  2. Denning, D.: A lattice model of secure information flow. Comm. ACM 19, 236–243 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  3. Biba, K.: Integrity considerations for secure computer systems. Report TR-3153, Mitre Corporation, Bedford, Mass. (1977)

    Google Scholar 

  4. Gollmann, D.: Computer Security. John Wiley & Sons Ltd, Chichester (1999)

    Google Scholar 

  5. Bell, D., LaPadula, L.: Secure computer systems: Mathematical foundations and model. Report M74-244, Mitre Corporation, Bedford, Mass. (1975)

    Google Scholar 

  6. Ganter, B., Wille, R.: Formal Concept Analysis: Mathematical Foundations. Springer, Berlin (1999)

    MATH  Google Scholar 

  7. Lipner, S.: Nondiscretionary controls for commercial applications. In: Proc. IEEE Symp. Security and Privacy, pp. 2–10. IEEE CS Press, Los Alamitos (1982)

    Google Scholar 

  8. Smith, G.: The Modeling and Representation of Security Semantics for Database Applications. PhD thesis, George Mason Univ. Fairfax, Va. (1990)

    Google Scholar 

  9. Birkhoff, G.: Lattice Theory. Amer. Math. Soc. Coll. Publ. Providence, R.I. (1973)

    Google Scholar 

  10. Guigues, J.L., Duquenne, V.: Familles minimales d’implications informatives resultant d’un tableau de données binaires. Math. Sci. Humaines 95, 5–18 (1986)

    MathSciNet  Google Scholar 

  11. Ganter, B.: Attribute exploration with background knowledge. Theoretical Computer Science 217, 215–233 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  12. Ganter, B., Krausse, R.: Pseudo models and propositional horn inference. Technical Report MATH-AL-15-1999, Technische Universität Dresden, Germany (1999)

    Google Scholar 

  13. Ganter, B.: Two basic algorithms in concept analysis. Preprint Nr. 831, Technische Hochschule Darmstadt (1984)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Obiedkov, S., Kourie, D.G., Eloff, J.H.P. (2006). On Lattices in Access Control Models. In: Schärfe, H., Hitzler, P., Øhrstrøm, P. (eds) Conceptual Structures: Inspiration and Application. ICCS 2006. Lecture Notes in Computer Science(), vol 4068. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11787181_27

Download citation

  • DOI: https://doi.org/10.1007/11787181_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-35893-0

  • Online ISBN: 978-3-540-35902-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics