Skip to main content

On the Possibilistic Handling of Priorities in Access Control Models

  • Conference paper
  • First Online:
Foundations and Applications of Intelligent Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 213))

  • 2005 Accesses

Abstract

Access control models are important tools for modelling security policies. They allow to limit the access to sensitive data to only authorized users. This paper focuses on organization-based access control (OrBAC) model which represents a generic framework for compactly representing general security policies rules. More precisely, we propose to add to OrBAC model a new entity, called priority, that encodes different forms of uncertainty that may be encountered in security rules. These priorities will be modelled in possibility theory which represents a natural framework for handling uncertain information. We propose different combination rules that allow to derive concrete permissions from prioritized abstract permissions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Harrison MA, Ruzzo WL, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461–471

    Google Scholar 

  2. Lampson BW Protection. In: Proceedings of fifth annual Princeton conference on information sciences and systems, Princeton University, pp 437–443 March 1971

    Google Scholar 

  3. Sutherland D (1986) A model of information. In: processing of the 9th national computer security conference. National bureau of standards and national computer security center, pp 175–183 Sept 1986

    Google Scholar 

  4. Ferraiolo DF, Ravi S, Serban G, Richard KD, Ramaswamy C (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4(3):224–274

    Article  Google Scholar 

  5. Gavrila SI Barkley JF (1996) Formal specification for role based access control user/role and role/role relationship management. Third ACM workshop on role-based, pp 81–90, 22–23 Oct 1996

    Google Scholar 

  6. Ravi S, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47

    Article  Google Scholar 

  7. Kalam AEL, Baida REL, Balbiani P, Benferhat S, Cuppens F, Deswarte Y, Miège A, Saurel C, Trouessin G (2003) Organization based access control. 4th IEEE international workshop on policies for distributed systems and networks (Policy’03), 4–6 June 2003

    Google Scholar 

  8. Dubois D, Lang J, Prade H (1994) Possibilistic logic. Handbook of Logic in artificial intelligence and logic programming, vol 3. Oxford University Press, Oxford, pp 439–513

    Google Scholar 

  9. Thomas R, Sandhu R (1997) Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. 11th IFIP working conference on database security, Lake Tahoe

    Google Scholar 

  10. Bell DE, LaPadula LJ (1976) Secure computer systems: unified exposition and multics interpretation. Technical Report ESD-TR-73-306. The MITRE Corporation, Technical Report, March 1976

    Google Scholar 

  11. Biba KJ (1975) Integrity considerations for secure computer systems. Technical Report TR-3153, The Mitre Corporation, Bedford, June 1975

    Google Scholar 

  12. Thomas R (1997) Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. In: Proceedings of the second ACM workshop on Role-based access control, no. RBAC ‘97, pp 13–19

    Google Scholar 

  13. Cuppens F, Miège A (2003) Modelling contexts in the Or-BAC Model. 19th annual computer security applications conference (ACSAC ‘03), Dec 2003

    Google Scholar 

  14. Cuppens F, Cuppens-Boulahia N, Coma C (2006) MotOrBAC: an administration and simulation tool of security policies. Security in network architectures (SAR) and Security of information systems (SSI), first joint conference, 6–9 June 2006

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Salem Benferhat .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Benferhat, S., Bouriche, K., Ouzarf, M. (2014). On the Possibilistic Handling of Priorities in Access Control Models. In: Sun, F., Li, T., Li, H. (eds) Foundations and Applications of Intelligent Systems. Advances in Intelligent Systems and Computing, vol 213. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-37829-4_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-37829-4_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-37828-7

  • Online ISBN: 978-3-642-37829-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics