Click for new scientific resources and news about Corona[COVID-19]

Paper Information

Journal:   JOURNAL OF ADVANCES IN COMPUTER ENGINEERING AND TECHNOLOGY   Spring 2018 , Volume 4 , Number 4; Page(s) 255 To 266.

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Author(s):  Kuang Teo Poh, Ibrahim Hamidah*, Sidi Fatimah, Udzir Nur Izura
* Computer Science Department, Universiti Putra Malaysia
Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is needed to detect the modality conflicts that occur among the applicable policies. This work proposes a modality conflict detection model to identify the applicable policies during policy evaluation, which supports an authorization propagation rule to investigate the classsubclass relationships of a subject, resource, action, and location of a request and a policy. The comparison with previous work is conducted, and findings show the solution which considers the condition attribute (i. e. spatial and temporal constraints) can affect the decision as to whether the applicable policies should be retrieved or not which further affect the accuracy of the modality conflict detection process. Whereas the applicable policies which are retrieved for a request can influence the detection of modality conflict among the applicable policies. In conclusion, our proposed solution is more effective in identifying the applicable policies and detecting modality conflict than the previous work.
Keyword(s): Access control policies,authorization propagation,effectiveness,modality conflict,policy evaluation,XACML
  • ندارد
مباني نظري و تجربي ونداليسم: مروري بر يافته هاي يك تحقيق Yearly Visit 28
Latest on Blog
Enter SID Blog