dc.contributor.author |
Shamoon, Imran |
|
dc.date.accessioned |
2020-11-04T10:41:35Z |
|
dc.date.available |
2020-11-04T10:41:35Z |
|
dc.date.issued |
2013 |
|
dc.identifier.uri |
http://10.250.8.41:8080/xmlui/handle/123456789/9804 |
|
dc.description |
Supervisor: Dr. Muhammad Awais Shibli |
en_US |
dc.description.abstract |
In multi-user environment where users and organizational policies are chang-
ing frequently and access to di erent resources is controlled by di erent access
mechanisms such as Access Control Lists. An ACL may de ne the access of
resource to the individual user or group of users and one user may be the
part of one or more groups. ACLs are added or deleted whenever there is
a change in existing organization policy or addition or deletion of new user
or group of users. One ACL is written against one or more organizational
policies. This complex scenario leads to the ACLs con
icts. These con
icts
lead to the vulnerability in access control system. This vulnerability causes
unauthenticated access to information and resources. In our system, rstly
we proposed ACL con
ict detection and resolution algorithm, which resolve
con
icts with user interaction. Secondly, We use XACML policy speci cation
language to convert the con
ict free ACLs to XACML policy. After that our
request evaluator uses this XACML policy to response the access request. |
en_US |
dc.publisher |
SEECS, National University of Science and Technology, Islamabad. |
en_US |
dc.subject |
Information Technology, Access Control Lists Conflict Detection |
en_US |
dc.title |
Access Control Lists Conflict Detection and Resolution System |
en_US |
dc.type |
Thesis |
en_US |