General Methods for Access Control Policy Verification

被引:2
|
作者
Hu, Vincent C. [1 ]
Kuhn, D. Richard [1 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
来源
PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI) | 2016年
关键词
Access Control; Authorization; Policy; Policy Verification; Policy Testing; Policy Tool; Model Checking;
D O I
10.1109/IRI.2016.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access control models are usually written, bridging the gap in abstraction between policies and mechanisms. Identifying discrepancies between policy specifications and their intended function is crucial because correct implementation and enforcement of policies by applications is based on the premise that the policy specifications are correct. As a result, policy specifications represented by models must undergo rigorous verification and validation through systematic verification and testing to ensure that the policy specifications truly encapsulate the desires of the policy authors. Verifying the conformance of access control policies and models is a non-trivial and critical task, and one important aspect of such verification is to formally check the inconsistency and incompleteness of the model and safety requirements of the policy, because an access control model and its implementation do not necessarily explicitly express the policy, which can also be implicitly embedded by mixing with direct access constraints or other access control models.
引用
收藏
页码:315 / 323
页数:9
相关论文
共 50 条
  • [1] Access Control Policy Verification
    Hu, Vincent C.
    Kuhn, Rick
    COMPUTER, 2016, 49 (12) : 80 - 83
  • [2] Evaluating the Capability and Performance of Access Control Policy Verification Tools
    Li, Ang
    Li, Qinghua
    Hu, Vincent C.
    Di, Jia
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 366 - 371
  • [3] Verification and Analysis of Access Control Policy with Colored Petri Net
    Feng, Fujun
    Li, Junshan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS, 2009, : 610 - 614
  • [4] Access Control Policy Translation and Verification within Heterogeneous Data Federations
    Leighton, Gregory
    Barbosa, Denilson
    SACMAT 2010: PROCEEDINGS OF THE 15TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2010, : 173 - 182
  • [5] Dynamic Access Control Policies: Specification and Verification
    Janicke, H.
    Cau, A.
    Siewe, F.
    Zedan, H.
    COMPUTER JOURNAL, 2013, 56 (04) : 440 - 463
  • [6] Access Control Policy Translation, Verification, and Minimization within Heterogeneous Data Federations
    Leighton, Gregory
    Barbosa, Denilson
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (03)
  • [7] Specification and adaptive verification of access control policy for cyber-physical-social spaces
    Cao, Yan
    Ping, Yuan
    Tao, Shaohua
    Chen, YongGang
    Zhu, YanXia
    COMPUTERS & SECURITY, 2022, 114
  • [8] Verification and enforcement of access control policies
    Antonio Cau
    Helge Janicke
    Ben Moszkowski
    Formal Methods in System Design, 2013, 43 : 450 - 492
  • [9] A comprehensive approach to the automatic refinement and verification of access control policies
    Cherninod, Manuel
    Durante, Luca
    Seno, Lucia
    Valenza, Fulvio
    Valenzano, Adriano
    COMPUTERS & SECURITY, 2019, 80 : 186 - 199
  • [10] Verification and enforcement of access control policies
    Cau, Antonio
    Janicke, Helge
    Moszkowski, Ben
    FORMAL METHODS IN SYSTEM DESIGN, 2013, 43 (03) : 450 - 492