PUMA publications for /author/J.H.P.%20Eloff/control%20securityhttps://puma.uni-kassel.de/author/J.H.P.%20Eloff/control%20securityPUMA RSS feed for /author/J.H.P.%20Eloff/control%20security2024-03-19T03:37:55+01:00Building access control models with attribute explorationhttps://puma.uni-kassel.de/bibtex/27be2b4bf0987c4d18adf7243eae690c0/jaeschkejaeschke2012-12-21T10:15:28+01:00concept formal control access security exploration analysis fca attribute <span class="authorEditorList"><span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Sergei Obiedkov" itemprop="url" href="/author/Sergei%20Obiedkov"><span itemprop="name">S. Obiedkov</span></a></span>, <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="Derrick G. Kourie" itemprop="url" href="/author/Derrick%20G.%20Kourie"><span itemprop="name">D. Kourie</span></a></span>, und <span itemtype="http://schema.org/Person" itemscope="itemscope" itemprop="author"><a title="J.H.P. Eloff" itemprop="url" href="/author/J.H.P.%20Eloff"><span itemprop="name">J. Eloff</span></a></span>. </span><span itemtype="http://schema.org/PublicationIssue" itemscope="itemscope" itemprop="isPartOf"><span itemtype="http://schema.org/Periodical" itemscope="itemscope" itemprop="isPartOf"><span itemprop="name"><em>Computers and Security</em></span></span> <em><span itemtype="http://schema.org/PublicationVolume" itemscope="itemscope" itemprop="isPartOf"><span itemprop="volumeNumber">28 </span></span>(<span itemprop="issueNumber">1–2</span>):
<span itemprop="pagination">2--7</span></em> </span>(<em><span>2009<meta content="2009" itemprop="datePublished"/></span></em>)Fri Dec 21 10:15:28 CET 2012Computers and Security1–22--7Building access control models with attribute exploration282009concept formal control access security exploration analysis fca attribute The use of lattice-based access control models has been somewhat restricted by their complexity. We argue that attribute exploration from formal concept analysis can help create lattice models of manageable size, while making it possible for the system designer to better understand dependencies between different security categories in the domain and, thus, providing certain guarantees for the relevance of the constructed model to a particular application. In this paper, we introduce the method through an example.