Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Journal Article

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

Published: April 13, 2017
Citation: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications vol. 8, no. 1, (March 2017) pp. 4-25

Author(s)

Peter Mell (NIST), James Shook (NIST), Richard Harang (Invincea), Serban Gavrila (NIST)

Abstract

Keywords

ABAC; NGAC; Policy Machine;  ; access control;  ; algorithms;  ; complexity;  ; computer security;  ; graph theory;  ; insider;  ; NIST;  ;  ; simultaneous instantiation;  ; XaCML
Control Families

None selected

Documentation

Publication:
Journal Article (DOI)

Supplemental Material:
Article (pdf)

Topics

Security and Privacy
access control