On flexible modeling of history-based access control policies for XML documents

Patrick Rôder, Omid Tafreschi, Claudia Eckert

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

Many scenarios require models for access control which consider former accesses to permit or deny access. One such model is the Chinese Wall model (CWM) which was designed to prevent the misuse of insider knowledge in the consulting business. In this paper, we show that our model for history-based access control provides a flexible and expressive method to define access depending on histories, which contain information about former accesses. We demonstrate this by modeling the policies of the CWM in a way that avoids the unnecessary restrictions of the original CWM.

Original languageEnglish
Title of host publicationKnowledge-Based Intelligent Information and Engineering Systems
Subtitle of host publicationKES 2007 - WIRN 2007 - 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Proceedings
PublisherSpringer Verlag
Pages1090-1097
Number of pages8
EditionPART 3
ISBN (Print)9783540748281
DOIs
StatePublished - 2007
Externally publishedYes
Event11th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2007, and 17th Italian Workshop on Neural Networks, WIRN 2007 - Vietri sul Mare, Italy
Duration: 12 Sep 200714 Sep 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 3
Volume4694 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Conference on Knowledge-Based and Intelligent Information and Engineering Systems, KES 2007, and 17th Italian Workshop on Neural Networks, WIRN 2007
Country/TerritoryItaly
CityVietri sul Mare
Period12/09/0714/09/07

Keywords

  • Access control
  • Chinese wall model
  • XML

Fingerprint

Dive into the research topics of 'On flexible modeling of history-based access control policies for XML documents'. Together they form a unique fingerprint.

Cite this