{"title":"Conceptualizing and Generalizing Access Control","authors":"S. Al-Fedaghi","doi":"10.1109/ICISA.2010.5480356","DOIUrl":null,"url":null,"abstract":"Access control models traditionally have been used to indicate which subjects have access to which objects. This paper conceptualizes access control in terms of information flow. A fundamental concept in this flow is that objects are \"things that flow\", i.e., that are received, processed, created, released, and transferred. The resulting diagrammatic description specifies the stream of flow between subjects and the system. Accordingly, security policies and constraints can be declared to control the flow in the stream. The paper gives an illustration of this flow-based description and provides examples from the security field that generalize the known access control methods.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480356","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Access control models traditionally have been used to indicate which subjects have access to which objects. This paper conceptualizes access control in terms of information flow. A fundamental concept in this flow is that objects are "things that flow", i.e., that are received, processed, created, released, and transferred. The resulting diagrammatic description specifies the stream of flow between subjects and the system. Accordingly, security policies and constraints can be declared to control the flow in the stream. The paper gives an illustration of this flow-based description and provides examples from the security field that generalize the known access control methods.