Using the decision support algorithms combining different security policies

12/19/2018
by   S. V. Belim, et al.
0

During the development of the security subsystem of modern information systems, a problem of the joint implementation of several access control models arises quite often. Traditionally, a request for the user's access to resources is granted in case of simultaneous access permission by all active security policies. When there is a conflict between the decisions of the security policies, the issue of granting access remains open. The proposed method of combining multiple security policies is based on the decision support algorithms and provides a response to the access request, even in case of various decisions of active security policies. To construct combining algorithm we determine a number of weight coefficients, use a weighted sum of the clearance levels of individual security policies and apply the analytic hierarchy process. The weight coefficients are adjustable parameters of the algorithm and allow administrator to manage the impact of the various security rules flexibly.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/28/2013

Semantic Matching of Security Policies to Support Security Experts

Management of security policies has become increasingly difficult given ...
research
07/04/2022

Combining ID's, Attributes, and Policies in Hyperledger Fabric

This work aims to provide a more secure access control in Hyperledger Fa...
research
09/21/2019

Graph Model Implementation of Attribute-Based Access Control Policies

Attribute-based access control (ABAC) promises a powerful way of formali...
research
03/29/2023

Model Checking Access Control Policies: A Case Study using Google Cloud IAM

Authoring access control policies is challenging and prone to misconfigu...
research
07/07/2023

CloudSec: An Extensible Automated Reasoning Framework for Cloud Security Policies

Users increasingly create, manage and share digital resources, including...
research
12/20/2018

User Authorization in a System with a Role-Based Access Control on the Basis of the Analytic Hierarchy Process

The problem of optimal authorization of a user in a system with a role-b...
research
05/18/2022

BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems

Cyber physical ecosystem connects different intelligent devices over het...

Please sign up or login with your details

Forgot password? Click here to reset