Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

Journal Article

Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems

Published: April 13, 2017
Citation: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications vol. 8, no. 1, (March 2017) pp. 4-25

Author(s)

Peter Mell (NIST), James Shook (NIST), Richard Harang (Invincea), Serban Gavrila (NIST)

Abstract

Keywords

ABAC; NGAC; Policy Machine;   access control;   algorithms;   complexity;   computer security;   graph theory;   insider;   NIST;     simultaneous instantiation;   XaCML
Control Families

None selected

Documentation

Publication:
Journal Article (DOI)

Supplemental Material:
Article (pdf)

Topics

Security and Privacy
access control