General Methods for Access Control Policy Verification

被引:2
|
作者
Hu, Vincent C. [1 ]
Kuhn, D. Richard [1 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
来源
PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI) | 2016年
关键词
Access Control; Authorization; Policy; Policy Verification; Policy Testing; Policy Tool; Model Checking;
D O I
10.1109/IRI.2016.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access control models are usually written, bridging the gap in abstraction between policies and mechanisms. Identifying discrepancies between policy specifications and their intended function is crucial because correct implementation and enforcement of policies by applications is based on the premise that the policy specifications are correct. As a result, policy specifications represented by models must undergo rigorous verification and validation through systematic verification and testing to ensure that the policy specifications truly encapsulate the desires of the policy authors. Verifying the conformance of access control policies and models is a non-trivial and critical task, and one important aspect of such verification is to formally check the inconsistency and incompleteness of the model and safety requirements of the policy, because an access control model and its implementation do not necessarily explicitly express the policy, which can also be implicitly embedded by mixing with direct access constraints or other access control models.
引用
收藏
页码:315 / 323
页数:9
相关论文
共 50 条
  • [21] Access Control Policy Misconfiguration Detection in Online Social Networks
    Javed, Yousra
    Shehab, Mohamed
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 544 - 549
  • [22] Enabling Verification and Conformance Testing for Access Control Model
    Hu, Hongxin
    Ahn, Gail-Joon
    SACMAT'08: PROCEEDINGS OF THE 13TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2008, : 195 - 204
  • [23] UML specification of access control policies and their formal verification
    Koch M.
    Parisi-Presicce F.
    Software & Systems Modeling, 2006, 5 (4) : 429 - 447
  • [24] Policy-based access control model for mobile agent system
    Chen Xiao-su
    Lin Zhi
    2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 1222 - 1225
  • [25] Policy-Based Access Control Scheme for Securing Hadoop Ecosystem
    Shetty, Madhvaraj M.
    Manjaiah, D. H.
    Hemdan, Ezz El-Din
    DATA MANAGEMENT, ANALYTICS AND INNOVATION, ICDMAI 2018, VOL 2, 2019, 839 : 167 - 176
  • [26] Access Control Metamodel for Policy Specification and Enforcement: From Conception to Formalization
    Kashmar, Nadine
    Adda, Mehdi
    Atieh, Mirna
    Ibrahim, Hussein
    12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 887 - 892
  • [27] DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement
    Kirrane, Sabrina
    SEMANTIC WEB - ISWC 2011, PT II, 2011, 7032 : 293 - 300
  • [28] Policy Based Role Centric Attribute Based Access Control Model Policy RC-ABAC
    Varadharajan, Vijayaraghavan
    Amid, Alon
    Rai, Sudhanshu
    2015 INTERNATIONAL CONFERENCE ON COMPUTING AND NETWORK COMMUNICATIONS (COCONET), 2015, : 427 - 432
  • [29] A certified access control policy language: TEpla
    Amir Eaman
    Amy Felty
    Innovations in Systems and Software Engineering, 2024, 20 : 49 - 64
  • [30] Access Control Policy Based on Behavior Patterns
    Zhu, XiPing
    Feng, Hao
    Chen, Hong
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 557 - 560