Skip to main content

Access Control Policy Languages

  • Living reference work entry
  • First Online:
  • 117 Accesses

Synonyms

Authorization policy languages

Definition

An access control policy language is a particular set of grammar, syntax rules (logical and mathematical), and operators which provides an abstraction-layer for access control policy specifications. Such languages combine individual rules into a single policy set, which is the basis for (user/subject) authorization decisions on accessing content (object) stored in various information resources. The operators of an access control policy language are used on attributes of the subject, resource (object), and their underlying application framework to facilitate identifying the policy that (most appropriately) applies to a given action.

Historical Background

The evolution of access control policy languages is inline with the evolving large-scale highly distributed information systems and the Internet, which turned the tasks of authorizing and controlling of accessing on a global enterprise (or on Internet) framework increasingly challenging...

This is a preview of subscription content, log in via an institution.

Recommended Reading

  1. Stoupa K, Vakali A. Policies for web security services, chapter III. In: Ferrari E, Thuraisingham B, editors. Web and information security. Hershey: Idea-Group Publishing; 2006.

    Google Scholar 

  2. Vuong NN, Smith GS, Deng Y. Managing security policies in a distributed environment using eXtensible markup language (XML). In: Proceedings of 16th ACM Symposium on Applied Computing; 2001. p. 405–11.

    Google Scholar 

  3. Alm C, Wolf R, Posegga J. The OPL access control policy language. In: Fischer-H¨ubner S, et al., editors. TrustBus 2009, LNCS 5695. Berlin/Heidelberg: Springer; 2009. p. 138–48.

    Google Scholar 

  4. Bertino E, Castano S, Ferrari E. On specifying security policies for web documents with an XML-based language. In: Proceedings of 6th ACM Symposium on Access Control Models and Technologies; 2001. p. 57–65.

    Google Scholar 

  5. Bertino E, Castano S, Ferrari E. Securing XML documents with author-X. IEEE Internet Computing. May–June 2001. p. 21–31.

    Google Scholar 

  6. Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P. Design and implementation of an access control processor forXML documents. In: Proceedings of 9th International World Wide Web Conference; 2000. p. 59–75.

    Google Scholar 

  7. He H, Wong RK. A role-based access control model for XML repositories. In: Proceedings of 1st International Conference on Web Information Systems Engineering; 2000. p. 138–45.

    Google Scholar 

  8. Stoupa K. Access control techniques in distributed systems and the Internet. Ph.D. Thesis, Aristotle University, Department of Informatics; 2007.

    Google Scholar 

  9. Fong PWL. Relationship-based access control: protection model and policy language. In: Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY ‘11). New York: ACM; 2011. p. 191–202.

    Google Scholar 

  10. Rachapalli J, Khadilkar V, Kantarcioglu M, Thuraisingham B. Redaction based RDF access control language. In: Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT ‘14). New York: ACM; 2014. p. 177–80.

    Google Scholar 

  11. Qi N, Kud M. Access control policy languages in XML, applications and trends. Springer Science+Business Media, LLC; 2008. p. 55–71.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Athena Vakali .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this entry

Cite this entry

Vakali, A. (2014). Access Control Policy Languages. In: Liu, L., Özsu, M. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4899-7993-3_5-2

Download citation

  • DOI: https://doi.org/10.1007/978-1-4899-7993-3_5-2

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, New York, NY

  • Online ISBN: 978-1-4899-7993-3

  • eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering

Publish with us

Policies and ethics