General Methods for Access Control Policy Verification

被引:2
|
作者
Hu, Vincent C. [1 ]
Kuhn, D. Richard [1 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
来源
PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI) | 2016年
关键词
Access Control; Authorization; Policy; Policy Verification; Policy Testing; Policy Tool; Model Checking;
D O I
10.1109/IRI.2016.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access control models are usually written, bridging the gap in abstraction between policies and mechanisms. Identifying discrepancies between policy specifications and their intended function is crucial because correct implementation and enforcement of policies by applications is based on the premise that the policy specifications are correct. As a result, policy specifications represented by models must undergo rigorous verification and validation through systematic verification and testing to ensure that the policy specifications truly encapsulate the desires of the policy authors. Verifying the conformance of access control policies and models is a non-trivial and critical task, and one important aspect of such verification is to formally check the inconsistency and incompleteness of the model and safety requirements of the policy, because an access control model and its implementation do not necessarily explicitly express the policy, which can also be implicitly embedded by mixing with direct access constraints or other access control models.
引用
收藏
页码:315 / 323
页数:9
相关论文
共 50 条
  • [11] MODEL CHECKING FOR VERIFICATION OF MANDATORY ACCESS CONTROL MODELS AND PROPERTIES
    Hu, Vincent C.
    Kuhn, D. Richard
    Xie, Tao
    Hwang, Jeehyun
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2011, 21 (01) : 103 - 127
  • [12] Explanations and Relaxations for Policy Conflicts in Physical Access Control
    Turkmen, Fatih
    Foley, Simon
    O'Sullivan, Barry
    Fitzgerald, William
    Hadzic, Tarik
    Basagiannis, Stylianos
    Boubekeur, Menouer
    2013 IEEE 25TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI), 2013, : 330 - 336
  • [13] A Dynamic Access Control Policy Based on Hierarchical Description
    Han, Dao-jun
    Gong, Ling
    Qin, Fen
    2016 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY PROCEEDINGS - CYBERC 2016, 2016, : 76 - 80
  • [14] Dependent Type Theory for Verification of Information Flow and Access Control Policies
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 2013, 35 (02):
  • [15] Access Control and Query Verification for Untrusted Databases
    Jain, Rohit
    Prabhakar, Sunil
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVII, 2013, 7964 : 211 - 225
  • [16] Access Control Policy Generation Method Based on Access Control Logs
    Liu Aodi
    Du Xuehui
    Wang Na
    Shan Dibin
    Zhang Liu
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 324 - 331
  • [17] An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
    Karimi, Leila
    Aldairi, Maryam
    Joshi, James
    Abdelhakim, Mai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2304 - 2317
  • [18] A policy model for access control using building information models
    Skandhakumar, Nimalaprakasan
    Reid, Jason
    Salim, Farzad
    Dawson, Ed
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 23 : 1 - 10
  • [19] Research on Multi-policy Supporting Access Control Model
    Jing, Wang
    Lian-xing, Jia
    Zhi, Lin
    PROCEEDINGS OF THE 2011 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2011, : 185 - 195
  • [20] A Tool for Access Control Policy Validation
    Aqib, Muhammad
    Shaikh, Riaz Ahmed
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (01): : 157 - 166