Semantic web technologies to aid dominance detection for access control policies
We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 783 |
---|---|
container_issue | |
container_start_page | 780 |
container_title | |
container_volume | |
creator | Barron, Jason Davy, Steven |
description | We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant. |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6573077</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6573077</ieee_id><sourcerecordid>6573077</sourcerecordid><originalsourceid>FETCH-LOGICAL-i105t-b74ab69a0c2cdcaa41549ed07ba58fc13cfec7ce0de1b489274ede45a4386d8f3</originalsourceid><addsrcrecordid>eNotj81KxDAURiMqOI59Ajd5gUJ-m2Qpg38woKCuh5ubWw10kqEpiG9vQVdn8XE-OGfsWgchvVdWqHPWBeelGZy2SgV5wTbSOt0L4dwV61rLUSgv_OCs2LDXNzpCWTLyb4p8IfwqdaqfmRpfKoeceKrHXKAg8UTrvuRa-FhnDojUGsdalrlO_FSnjKt2wy5HmBp1_9yyj4f7991Tv395fN7d7fsshV366AzEIYBAhQkBjLQmUBIugvUjSo0joUMSiWQ0PihnKJGxYLQfkh_1lt3-_WYiOpzmfIT55zCspWun_gVWLU6d</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Semantic web technologies to aid dominance detection for access control policies</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Barron, Jason ; Davy, Steven</creator><creatorcontrib>Barron, Jason ; Davy, Steven</creatorcontrib><description>We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.</description><identifier>ISSN: 1573-0077</identifier><identifier>ISBN: 9781467352291</identifier><identifier>ISBN: 1467352292</identifier><identifier>EISBN: 3901882502</identifier><identifier>EISBN: 9783901882500</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Algorithm design and analysis ; Computational modeling ; Ontologies ; Optimization ; Redundancy ; Semantics</subject><ispartof>2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013, p.780-783</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6573077$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6573077$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Barron, Jason</creatorcontrib><creatorcontrib>Davy, Steven</creatorcontrib><title>Semantic web technologies to aid dominance detection for access control policies</title><title>2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)</title><addtitle>INM</addtitle><description>We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.</description><subject>Access control</subject><subject>Algorithm design and analysis</subject><subject>Computational modeling</subject><subject>Ontologies</subject><subject>Optimization</subject><subject>Redundancy</subject><subject>Semantics</subject><issn>1573-0077</issn><isbn>9781467352291</isbn><isbn>1467352292</isbn><isbn>3901882502</isbn><isbn>9783901882500</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KxDAURiMqOI59Ajd5gUJ-m2Qpg38woKCuh5ubWw10kqEpiG9vQVdn8XE-OGfsWgchvVdWqHPWBeelGZy2SgV5wTbSOt0L4dwV61rLUSgv_OCs2LDXNzpCWTLyb4p8IfwqdaqfmRpfKoeceKrHXKAg8UTrvuRa-FhnDojUGsdalrlO_FSnjKt2wy5HmBp1_9yyj4f7991Tv395fN7d7fsshV366AzEIYBAhQkBjLQmUBIugvUjSo0joUMSiWQ0PihnKJGxYLQfkh_1lt3-_WYiOpzmfIT55zCspWun_gVWLU6d</recordid><startdate>201305</startdate><enddate>201305</enddate><creator>Barron, Jason</creator><creator>Davy, Steven</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201305</creationdate><title>Semantic web technologies to aid dominance detection for access control policies</title><author>Barron, Jason ; Davy, Steven</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i105t-b74ab69a0c2cdcaa41549ed07ba58fc13cfec7ce0de1b489274ede45a4386d8f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Access control</topic><topic>Algorithm design and analysis</topic><topic>Computational modeling</topic><topic>Ontologies</topic><topic>Optimization</topic><topic>Redundancy</topic><topic>Semantics</topic><toplevel>online_resources</toplevel><creatorcontrib>Barron, Jason</creatorcontrib><creatorcontrib>Davy, Steven</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Barron, Jason</au><au>Davy, Steven</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Semantic web technologies to aid dominance detection for access control policies</atitle><btitle>2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)</btitle><stitle>INM</stitle><date>2013-05</date><risdate>2013</risdate><spage>780</spage><epage>783</epage><pages>780-783</pages><issn>1573-0077</issn><isbn>9781467352291</isbn><isbn>1467352292</isbn><eisbn>3901882502</eisbn><eisbn>9783901882500</eisbn><abstract>We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.</abstract><pub>IEEE</pub><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1573-0077 |
ispartof | 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013, p.780-783 |
issn | 1573-0077 |
language | eng |
recordid | cdi_ieee_primary_6573077 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Access control Algorithm design and analysis Computational modeling Ontologies Optimization Redundancy Semantics |
title | Semantic web technologies to aid dominance detection for access control policies |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A23%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Semantic%20web%20technologies%20to%20aid%20dominance%20detection%20for%20access%20control%20policies&rft.btitle=2013%20IFIP/IEEE%20International%20Symposium%20on%20Integrated%20Network%20Management%20(IM%202013)&rft.au=Barron,%20Jason&rft.date=2013-05&rft.spage=780&rft.epage=783&rft.pages=780-783&rft.issn=1573-0077&rft.isbn=9781467352291&rft.isbn_list=1467352292&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E6573077%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=3901882502&rft.eisbn_list=9783901882500&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6573077&rfr_iscdi=true |