ACPT: A tool for modeling and verifying access control policies

Jee Hyun Hwang, Tao Xie, Vincent Hu, Mine Altunay

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny) on requests are dependent on access control policies, ensuring the correct modeling and implementation of access control policies is crucial for adopting access control mechanisms. To address this issue, we develop a tool, called ACPT (Access Control Policy Testing), that helps to model and implement policies correctly during policy modeling, implementation, and verification.

Original languageEnglish (US)
Title of host publicationProceedings - 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010
Pages40-43
Number of pages4
DOIs
StatePublished - Dec 1 2010
Externally publishedYes
Event2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010 - Fairfax, VA, United States
Duration: Jul 21 2010Jul 23 2010

Publication series

NameProceedings - 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010

Other

Other2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010
CountryUnited States
CityFairfax, VA
Period7/21/107/23/10

ASJC Scopus subject areas

  • Hardware and Architecture
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'ACPT: A tool for modeling and verifying access control policies'. Together they form a unique fingerprint.

  • Cite this

    Hwang, J. H., Xie, T., Hu, V., & Altunay, M. (2010). ACPT: A tool for modeling and verifying access control policies. In Proceedings - 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010 (pp. 40-43). [5629938] (Proceedings - 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010). https://doi.org/10.1109/POLICY.2010.22