ARGUMENT-BASED APPROACHES IN PRIORITIZED CONFLICTING SECURITY POLICIES

Salem Benferhat, Rania El Baida

Abstract

Information security system is an important problem in many domains. Therefore, it is very important to define security policies to restrict access to pieces of information in order to guarantee security properties, i.e. confidentiality, integrity and availability requirements. The joint handling of confidentiality, integrity and availability properties raises the problem of potential conflicts. The objective of this paper is to propose tools, based on the argumentation reasoning, for handling conflicts in prioritized security policies.

References

  1. Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., and Trouessin, G. (2003). Organization based access control. In 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy'03), pages 120-131. IEEE Computer.
  2. Benferhat, S., Dubois, D., and Prade, H. (1995). How to infer from inconsistent beliefs without revising? In IJCAI'95, pages 1449-1455, Montréal, Canada. Morgan Kaufmann.
  3. Benferhat, S., Dubois, D., and Prade, H. (1997). Nonmonotonic reasoning, conditional objects and possibility theory. Artificial Intelligence Journal, 92:259- 276.
  4. Besnard, P. and Hunter, A. (2001). A logic-based theory of deductive arguments. Artificial Intelligence, 128:203- 235.
  5. Brewka, G. (1989). Preferred Subtheories: an extended logical framework for default reasoning. In International Joint Conference on Artificial Intelligence (IJCAI'89), pages 1043-1048. Morgan Kaufmann Publishers.
  6. Dung, P. M. (1993). On the acceptability of arguments and its fundamental role in non-monotonic reasoning and logic programming. In 13th International Joint Conference on Artificial Intelligence (IJCAI'93), pages 852-857. Morgan Kaufmann Publishers.
  7. Georgiadis, C., Mavridis, I., Pangalos, G., and Thomas, R. (2001). Flexible Team-Based Access Control Using Contexts. In 6th ACM Symposium on Access Control Models and Technologies (SACMAT'01), pages 21- 27. ACM Press.
  8. Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. (1996). Role-Based Access Control Models. IEEE Computer, 29(2):38-47.
  9. Wilikens, W., Feriti, S., and Masera, M. (2002). A contextrelated authorization access control method based on RBAC : a case study from the healthcare domain. In 7th ACM Symposium on Access Control Models and Technologies (SACMAT'02). ACM Press.
Download


Paper Citation


in Harvard Style

Benferhat S. and El Baida R. (2006). ARGUMENT-BASED APPROACHES IN PRIORITIZED CONFLICTING SECURITY POLICIES . In Proceedings of the Eighth International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-972-8865-43-6, pages 349-354. DOI: 10.5220/0002490603490354


in Bibtex Style

@conference{iceis06,
author={Salem Benferhat and Rania El Baida},
title={ARGUMENT-BASED APPROACHES IN PRIORITIZED CONFLICTING SECURITY POLICIES},
booktitle={Proceedings of the Eighth International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2006},
pages={349-354},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002490603490354},
isbn={978-972-8865-43-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Eighth International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - ARGUMENT-BASED APPROACHES IN PRIORITIZED CONFLICTING SECURITY POLICIES
SN - 978-972-8865-43-6
AU - Benferhat S.
AU - El Baida R.
PY - 2006
SP - 349
EP - 354
DO - 10.5220/0002490603490354