Flexible support for multiple access control policies

Article Properties
  • Language
    English
  • Publication Date
    2001/06/01
  • Indian UGC (Journal)
  • Refrences
    30
  • Citations
    120
  • Sushil Jajodia George Mason Univ., Fairfax. VA
  • Pierangela Samarati Univ. di Milano, Milan, Italy
  • Maria Luisa Sapino Univ. di Torino, Torino, Italy
  • V. S. Subrahmanian Univ. of Maryland, College Park
Abstract
Cite
Jajodia, Sushil, et al. “Flexible Support for Multiple Access Control Policies”. ACM Transactions on Database Systems, vol. 26, no. 2, 2001, pp. 214-60, https://doi.org/10.1145/383891.383894.
Jajodia, S., Samarati, P., Sapino, M. L., & Subrahmanian, V. S. (2001). Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2), 214-260. https://doi.org/10.1145/383891.383894
Jajodia S, Samarati P, Sapino ML, Subrahmanian VS. Flexible support for multiple access control policies. ACM Transactions on Database Systems. 2001;26(2):214-60.
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Description

How can systems enforce diverse security policies? This paper presents a unified framework that supports multiple access control policies within a single system, addressing the limitations of existing authorization models. The framework is based on a language that allows users to specify security policies for specific accesses. This language incorporates both positive and negative authorizations and includes notions of authorization derivation, conflict resolution, and decision strategies. Different strategies can be applied to users, groups, objects, or roles, based on security policy needs. The resulting framework offers flexibility and power, capturing traditional access control policies and real-world protection requirements often unsupported by existing systems. The major advantage is the ability to specify and enforce diverse, coexisting access control policies using the same security server.

As a publication in ACM Transactions on Database Systems, this research is focused on access control and security within database systems, aligning well with the journal's scope. The paper's proposal of a unified framework for enforcing multiple access control policies directly addresses the journal’s focus on data management and security. The framework's flexibility and applicability to real-world scenarios make it relevant to the journal's readership of database researchers and practitioners.

Refrences
Citations
Citations Analysis
The first research to cite this article was titled An authorization model for a public key management service and was published in 2001. The most recent citation comes from a 2023 study titled An authorization model for a public key management service . This article reached its peak citation in 2011 , with 12 citations.It has been cited in 77 different journals, 3% of which are open access. Among related journals, the ACM Transactions on Information and System Security cited this research the most, with 12 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year