Semantic web technologies to aid dominance detection for access control policies

We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Barron, Jason, Davy, Steven
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 783
container_issue
container_start_page 780
container_title
container_volume
creator Barron, Jason
Davy, Steven
description We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6573077</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6573077</ieee_id><sourcerecordid>6573077</sourcerecordid><originalsourceid>FETCH-LOGICAL-i105t-b74ab69a0c2cdcaa41549ed07ba58fc13cfec7ce0de1b489274ede45a4386d8f3</originalsourceid><addsrcrecordid>eNotj81KxDAURiMqOI59Ajd5gUJ-m2Qpg38woKCuh5ubWw10kqEpiG9vQVdn8XE-OGfsWgchvVdWqHPWBeelGZy2SgV5wTbSOt0L4dwV61rLUSgv_OCs2LDXNzpCWTLyb4p8IfwqdaqfmRpfKoeceKrHXKAg8UTrvuRa-FhnDojUGsdalrlO_FSnjKt2wy5HmBp1_9yyj4f7991Tv395fN7d7fsshV366AzEIYBAhQkBjLQmUBIugvUjSo0joUMSiWQ0PihnKJGxYLQfkh_1lt3-_WYiOpzmfIT55zCspWun_gVWLU6d</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Semantic web technologies to aid dominance detection for access control policies</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Barron, Jason ; Davy, Steven</creator><creatorcontrib>Barron, Jason ; Davy, Steven</creatorcontrib><description>We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.</description><identifier>ISSN: 1573-0077</identifier><identifier>ISBN: 9781467352291</identifier><identifier>ISBN: 1467352292</identifier><identifier>EISBN: 3901882502</identifier><identifier>EISBN: 9783901882500</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access control ; Algorithm design and analysis ; Computational modeling ; Ontologies ; Optimization ; Redundancy ; Semantics</subject><ispartof>2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013, p.780-783</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6573077$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6573077$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Barron, Jason</creatorcontrib><creatorcontrib>Davy, Steven</creatorcontrib><title>Semantic web technologies to aid dominance detection for access control policies</title><title>2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)</title><addtitle>INM</addtitle><description>We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.</description><subject>Access control</subject><subject>Algorithm design and analysis</subject><subject>Computational modeling</subject><subject>Ontologies</subject><subject>Optimization</subject><subject>Redundancy</subject><subject>Semantics</subject><issn>1573-0077</issn><isbn>9781467352291</isbn><isbn>1467352292</isbn><isbn>3901882502</isbn><isbn>9783901882500</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81KxDAURiMqOI59Ajd5gUJ-m2Qpg38woKCuh5ubWw10kqEpiG9vQVdn8XE-OGfsWgchvVdWqHPWBeelGZy2SgV5wTbSOt0L4dwV61rLUSgv_OCs2LDXNzpCWTLyb4p8IfwqdaqfmRpfKoeceKrHXKAg8UTrvuRa-FhnDojUGsdalrlO_FSnjKt2wy5HmBp1_9yyj4f7991Tv395fN7d7fsshV366AzEIYBAhQkBjLQmUBIugvUjSo0joUMSiWQ0PihnKJGxYLQfkh_1lt3-_WYiOpzmfIT55zCspWun_gVWLU6d</recordid><startdate>201305</startdate><enddate>201305</enddate><creator>Barron, Jason</creator><creator>Davy, Steven</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201305</creationdate><title>Semantic web technologies to aid dominance detection for access control policies</title><author>Barron, Jason ; Davy, Steven</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i105t-b74ab69a0c2cdcaa41549ed07ba58fc13cfec7ce0de1b489274ede45a4386d8f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Access control</topic><topic>Algorithm design and analysis</topic><topic>Computational modeling</topic><topic>Ontologies</topic><topic>Optimization</topic><topic>Redundancy</topic><topic>Semantics</topic><toplevel>online_resources</toplevel><creatorcontrib>Barron, Jason</creatorcontrib><creatorcontrib>Davy, Steven</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Barron, Jason</au><au>Davy, Steven</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Semantic web technologies to aid dominance detection for access control policies</atitle><btitle>2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)</btitle><stitle>INM</stitle><date>2013-05</date><risdate>2013</risdate><spage>780</spage><epage>783</epage><pages>780-783</pages><issn>1573-0077</issn><isbn>9781467352291</isbn><isbn>1467352292</isbn><eisbn>3901882502</eisbn><eisbn>9783901882500</eisbn><abstract>We present a dominance detection algorithm as part of a policy authoring process that makes extensive use of semantic models to perform a novel dominance detection of access control policies, where groups of deployed policies are considered in unison to discover redundancy. The approach is targeted towards the pre-deployment stage of the policy authoring process and aims to help prevent the introduction of redundant policies into the system. To achieve this, semantic queries are executed over instances of new and deployed policy elements in order to select matching elements for further analysis. The semantic queries may return a large number of deployed policy elements so we present an algorithm that prunes the search space to reduce the problem size. We show that for large sets of deployed policies, we can discover relatively large sets that are considered dominant.</abstract><pub>IEEE</pub><tpages>4</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1573-0077
ispartof 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013, p.780-783
issn 1573-0077
language eng
recordid cdi_ieee_primary_6573077
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access control
Algorithm design and analysis
Computational modeling
Ontologies
Optimization
Redundancy
Semantics
title Semantic web technologies to aid dominance detection for access control policies
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T08%3A23%3A40IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Semantic%20web%20technologies%20to%20aid%20dominance%20detection%20for%20access%20control%20policies&rft.btitle=2013%20IFIP/IEEE%20International%20Symposium%20on%20Integrated%20Network%20Management%20(IM%202013)&rft.au=Barron,%20Jason&rft.date=2013-05&rft.spage=780&rft.epage=783&rft.pages=780-783&rft.issn=1573-0077&rft.isbn=9781467352291&rft.isbn_list=1467352292&rft_id=info:doi/&rft_dat=%3Cieee_6IE%3E6573077%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=3901882502&rft.eisbn_list=9783901882500&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6573077&rfr_iscdi=true