A Model for Temporal Interval Authorizations
Levin, Timothy E.
Irvine, Cynthia E.
Nguyen, Thuy D.
Afinidad, Francis B.
MetadataShow full item record
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and objects, in a "time interval access graph." The time interval access graph is used to define constraints on the temporal relations between subjects, objects, and the time of access. Interval algebra is used to precisely define and analyze the time interval access graph, and to specify the evaluation of access requests.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Chiang, Ken; Nguyen, Thuy D.; Irvine, Cynthia E. (A Linux Implementation of Temporal Access Controls, 2007-06-01);Control of access to information based upon temporal attributes can add another dimension to access control. To demonstrate the feasibility of operating system level support for temporal access controls, the Time Interval ...
Chiang, Ken H. (Monterey, California. Naval Postgraduate School, 2006-09);Control of access to information based on temporal attributes has many potential applications. Examples include student user accounts set to expire upon graduation; files marked as time-sensitive so that their contents ...
Afinidad, Francis B.; Irvine, Cynthia E.; Nguyen, Thuy D.; Levin, Timothy E. (Monterey, California. Naval Postgraduate School, 2005-11); NPS-CS-06-002Time is often a critical factor for making decisions regarding access to information. To manage and protect critical data in this regard implies that information systems need to enforce temporal security policies. However, ...