@article{M9F1B16AB, title = "Case Study for Collecting Policy Evaluation Factors upon Request when Creating XACML Policy", journal = "Journal of KIISE, JOK", year = "2018", issn = "2383-630X", doi = "10.5626/JOK.2018.45.9.975", author = "Yongtaek Oh,Scott Uk-Jin Lee", keywords = "IoT access control,policy conflict,access control", abstract = "As the Internet of Things environment continues to expand, access control issues continue to emerge. OneM2M, one of the standards of the IOT platform, allows access control using XACML. In the arena of access control, conflicts must be solved. Because of this, various solutions are being investigated in order to solve these problems. Currently, however, the policy editor must solve policy conflicts by themselves. So, the policy editor needs to be able to effectively collect information about policies and conditions that affect their policy evaluation decisions in order to resolve policy conflicts. In this paper, we analyze policy and express policy evaluation methods in terms of Truth Table. In addition, we present a tree-based policy evaluation factor collection method through a case study on a policy evaluation factor collection method according to requests using Truth Table." }