Policy analysis for administrative role-based access control
DOI10.1016/J.TCS.2011.05.009zbMATH Open1234.68143OpenAlexW2044968788MaRDI QIDQ655414FDOQ655414
Authors: Amit Sasturkar, Ping Yang, Scott D. Stoller, C. R. Ramakrishnan
Publication date: 4 January 2012
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2011.05.009
Recommendations
Problem solving in the context of artificial intelligence (heuristics, search strategies, etc.) (68T20) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Computer system organization (68M99)
Cites Work
- The computational complexity of propositional STRIPS planning
- Protection in operating systems
- Beyond proof-of-compliance: security analysis in trust management
- Information Security
- Reducibility among combinatorial problems
- Analysis of dynamic policies
- Title not available (Why is that?)
- A Linear Time Algorithm for Deciding Subject Security
- Policy analysis for administrative role-based access control
Cited In (26)
- Security analysis of an administrative model of role-based access control
- Policy analysis for self-administrated role-based access control
- A framework for the analysis of access control policies with emergency management
- Analysis of the methods for attribute-based access control
- Symbolic backward reachability with effectively propositional logic. Application to security policy analysis
- Graph-theoretic analysis of the role security policy
- Title not available (Why is that?)
- A Logical Approach to Dynamic Role-Based Access Control
- Cryptographic role-based access control, reconsidered
- Data flow analysis from capability lists, with application to RBAC
- A SAT based verification framework for wireless LAN security policy management supported by STRBAC model
- Concurrency and time in role-based access control
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the complexity of role updating feasibility problem in RBAC
- Security property based administrative controls
- Lambda-RBAC: Programming with Role-Based Access Control
- Role delegation on multiple-attractor cellular automata based on pseudo-exhaustive bit patterns
- Ribac: role interaction based access control model for community computing
- Title not available (Why is that?)
- Policy Administration in Tag-Based Authorization
- Policy analysis for administrative role-based access control
- Title not available (Why is that?)
- λ-RBAC: Programming with Role-Based Access Control
- Role hierarchies and constraints for lattice-based access controls
- A multivariate approach for checking resiliency in access control
Uses Software
This page was built for publication: Policy analysis for administrative role-based access control
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q655414)