Transaction Control Expressions for Separation of Duties

@inproceedings{Sandhu1988TransactionCE,
  title={Transaction Control Expressions for Separation of Duties},
  author={R. R. Sandhu},
  year={1988}
}
We describe a model and notation for specifying and enforcing aspects of integrity policies, particularly separation of duties. The key idea is to associate a transaction control expression with each information object. This expression constrains the transactions which can be applied to that object to occur in the speci ed pattern. As operations are actually executed the transaction control expression gets converted to a history. This history serves to enforce separation of duties. We… CONTINUE READING
Highly Influential
This paper has highly influenced 12 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 244 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 144 extracted citations

A simple model of separation of duty for access control models

Computers & Security • 2017
View 6 Excerpts
Highly Influenced

Dynamic enforcement of abstract separation of duty constraints

ACM Trans. Inf. Syst. Secur. • 2012
View 8 Excerpts
Highly Influenced

Analyzing and Managing Role-Based Access Control Policies

IEEE Transactions on Knowledge and Data Engineering • 2008
View 3 Excerpts
Highly Influenced

Authorization constraint enforcement for information system security

2008 IEEE International Conference on Systems, Man and Cybernetics • 2008
View 5 Excerpts
Highly Influenced

244 Citations

01020'88'95'03'11'19
Citations per Year
Semantic Scholar estimates that this publication has 244 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 18 references

Implementing commercial data integrity with secure capabilities

IEEE Symposium on Security and Privacy • 1988
View 1 Excerpt

The Source of Authority for Commercial Access Control."Com

J. D. Mo ett, M. S. Sloman
1988
View 1 Excerpt

\ The Source of Authority for Commercial Access Control

J. D. Mo ett, M. S. Sloman
1988

Access-Right Expressions

ACM Trans. Program. Lang. Syst. • 1983

An Industry View of the DoD Computer Security Center Program." 6th Sem- inar on the DoD Computer Security Initiative

R. J. Courtney
1983
View 1 Excerpt

Moderator). \Panel Session | Base Spectrum of Computer Security Requirements." 6th Seminar on the DoD Computer Security Ini- tiative

S. Katzke
1983
View 1 Excerpt

Security Policies and Security Models

1982 IEEE Symposium on Security and Privacy • 1982

Similar Papers

Loading similar papers…