Information Technology (IT) systems comprise fine-grained Access Control (AC) mechanisms, commonly following the least privilege principle : restricting privileges of users to what is needed to fulfill their tasks. AC policies are machine readable rules used to enforce those privileges at runtime. Hence, for the definition of policies, all processes and scenarios which make up the benefit of the IT system have to be modeled in order to be able to define machine readable and enforceable policies. Thus, policies have to be defined beforehand in machine readable form and remain static at runtime.
KeywordsAccess Control Regular Case Exception Mechanism Exceptional Situation Machine Readable Form
Unable to display preview. Download preview PDF.