Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
J. G. Alfaro, F. Cuppens, and N. Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. In SAFECOMP, Gdansk, Poland, September 2006.
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827–842, 2004.
E. Bertino, S. Jajodia, and P. Samarati. Supporting Multiple Access Control Policies in Database Systems. In IEEE Symposium on Security and Privacy, Oakland, USA, 1996.
F. Cuppens, N. Cuppens-Boulahia, and M. Ben Ghorbel. High level conflict management strategies in advanced access control models. Electron. Notes Theor. Comput. Sci., 186:3–26, 2007.
F. Cuppens and A. Miège. Modelling Contexts in the Or-BAC Model. ACSAC, page 416, 2003.
N. Cuppens-Boulahia, F. Cuppens, D. Abi Haidar, and H. Debar. Negotiation of prohibition: An approach based on policy rewriting. Technical report, TELECOM Bretagne, 2008.
D. Abi Haidar, N. Cuppens, F. Cuppens, and H. Debar. Access Negotiation within XACML Architecture. Second Joint Conference on Security in Networks Architectures and Security of Information Systems (SARSSI), June 2007.
D. Abi Haidar, N. Cuppens, F. Cuppens, and H. Debar. Resource Classification Based Negotiation inWeb Services. Third International Symposium on Information Assurance and Security (IAS), pages 313–318, August 2007.
S. Jajodia, S. Samarati, and V. S. Subrahmanian. A logical Language for Expressing Authorizations. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.
A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June 2003.
A. Miège. Definition of a formal framework for specifying security policies. The Or-BAC model and extensions. PhD thesis, ENST, June 2005.
K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, April 2001.
K.E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. TrustBuilder: negotiating trust in dynamic coalitions. Proceedings DARPA Information Survivability Conference and Exposition, 2:49–51, April 2003.
B. Smith, K.E. Seamons, and M.D Jones. Responding to policies at runtime in TrustBuilder. Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY’04), pages 149–158, June 2004.
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1–42, February 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Cuppens-Boulahia, N., Cuppens, F., Haidar, D.A., Debar, H. (2008). Negotiation of Prohibition: An Approach Based on Policy Rewriting. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_12
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_12
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)