@inproceedings{9b66ba1e76544975b8370c403a30cf05,
title = "A high level language for conventional access control models",
abstract = "A formal language to specify general access control policies and their sequences of transformations has been proposed in [1]. The access control policy was specified by a domain description which consisted of a finite set of initial policy propositions, policy transformation propositions and default propositions. Usually, access control models are falls into two conventional categories: discretionary access control(DAC) and mandatory access control(MAC). Traditional DAC models basically enumerate all the subjects and objects in a system and regulate the access to the object based on the identity of the subject. It can be best represented by the HRU's access control matrix [4]. While on the other hand, MAC models are lattice based models, in the sense that each subject and object is associated with a sensitivity level which forms a lattice [3]. In this paper, we intend to demonstrate that both a DAC-like model and a MAC-like model can be realized by an approach using our formal language. We also discuss some other related works.",
keywords = "Access control model, Authorization policies, Formal language, Policy transformations",
author = "Yun Bai and Vijay Varadharajan",
year = "1998",
month = jul,
doi = "10.1007/BFb0053740",
language = "English",
isbn = "3540647325",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "273--283",
editor = "Colin Boyd and Ed Dawson",
booktitle = "Information Security and Privacy",
address = "United States",
note = "3rd Australasian Conference on Information Security and Privacy, ACISP - 1998 ; Conference date: 13-07-1998 Through 15-07-1998",
}