Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit

被引:3
作者
Hu, Vincent C. [1 ]
Scarfone, Karen [2 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
[2] Scarfone Cybersecur, Clifton Pk, NY USA
来源
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM) | 2013年
关键词
Access Control; Authorization; Model Verification; Testing; Verification; VERIFICATION; CHECKING; POLICY;
D O I
10.1109/SocialCom.2013.76
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control (AC) policies can be implemented based on different AC models, which are fundamentally composed by semantically independent AC rules in expressions of privilege assignments described by attributes of subjects/attributes, actions, objects/attributes, and environment variables of the protected systems. Incorrect implementations of AC policies result in faults that not only leak but also disable access of information, and faults in AC policies are difficult to detect without support of verification or automatic fault detection mechanisms. This research proposes an automatic method through the construction of a simulated logic circuit that simulates AC rules in AC policies or models. The simulated logic circuit allows real-time detection of policy faults including conflicts of privilege assignments, leaks of information, and conflicts of interest assignments. Such detection is traditionally done by tools that perform verification or testing after all the rules of the policy/model are completed, and it provides no information about the source of verification errors. The real-time fault detecting capability proposed by this research allows a rule fault to be detected and fixed immediately before the next rule is added to the policy/model, thus requiring no later verification and saving a significant amount of fault fixing time.
引用
收藏
页码:494 / 501
页数:8
相关论文
共 24 条
  • [1] Alloy, LANG TOOL REL MOD
  • [2] Bell D.E., 1976, ESDTR75306 MITRE COR
  • [3] Fisler K, 2005, PROC INT CONF SOFTW, P196
  • [4] Gouglidis A., 2013, IEEE TRUSTW COMP WOR
  • [5] Hansen F, 2005, LECT NOTES COMPUT SC, V3439, P144
  • [6] Harrison M. A., 1975, SOSP 75
  • [7] Hu HX, 2008, SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, P195
  • [8] Hu V., 2011, INT J INFORM ASSURAN, V6
  • [9] Hu V., 2006, 7376 NIST
  • [10] Hu V. C, 2013, Guide to Attribute Based Access Control (ABAC) Definition and Considerations (Draft)