M. Mejri, Etienne Theodore Sadio, Khadija Arrachid, Memel Emmanuel Lathe
{"title":"Access control validation by ontologies","authors":"M. Mejri, Etienne Theodore Sadio, Khadija Arrachid, Memel Emmanuel Lathe","doi":"10.1109/SoMeT.2013.6645642","DOIUrl":null,"url":null,"abstract":"The aim of this paper is to show how we can automatically extract access control information from Windows and Linux devices in order to analyze them in an automatic way by using ontologies. The extracted data related to access control are used to instantiate a defined ontology. After that, some reasoning engines are used to query the ontology in order to understand the implemented security policy or to compare it with an expected one.","PeriodicalId":447065,"journal":{"name":"2013 IEEE 12th International Conference on Intelligent Software Methodologies, Tools and Techniques (SoMeT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE 12th International Conference on Intelligent Software Methodologies, Tools and Techniques (SoMeT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SoMeT.2013.6645642","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The aim of this paper is to show how we can automatically extract access control information from Windows and Linux devices in order to analyze them in an automatic way by using ontologies. The extracted data related to access control are used to instantiate a defined ontology. After that, some reasoning engines are used to query the ontology in order to understand the implemented security policy or to compare it with an expected one.