General Methods for Access Control Policy Verification

被引:2
|
作者
Hu, Vincent C. [1 ]
Kuhn, D. Richard [1 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
来源
PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI) | 2016年
关键词
Access Control; Authorization; Policy; Policy Verification; Policy Testing; Policy Tool; Model Checking;
D O I
10.1109/IRI.2016.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access control models are usually written, bridging the gap in abstraction between policies and mechanisms. Identifying discrepancies between policy specifications and their intended function is crucial because correct implementation and enforcement of policies by applications is based on the premise that the policy specifications are correct. As a result, policy specifications represented by models must undergo rigorous verification and validation through systematic verification and testing to ensure that the policy specifications truly encapsulate the desires of the policy authors. Verifying the conformance of access control policies and models is a non-trivial and critical task, and one important aspect of such verification is to formally check the inconsistency and incompleteness of the model and safety requirements of the policy, because an access control model and its implementation do not necessarily explicitly express the policy, which can also be implicitly embedded by mixing with direct access constraints or other access control models.
引用
收藏
页码:315 / 323
页数:9
相关论文
共 50 条
  • [31] Modeling Access Control Policy of a Social Network
    Belbergui, Chaimaa
    Elkamoun, Najib
    Hilal, Rachid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2016, 7 (06) : 198 - 206
  • [32] Conviviality-driven access control policy
    El Kateb, Donia
    Zannone, Nicola
    Moawad, Assaad
    Caire, Patrice
    Nain, Gregory
    Mouelhi, Tejeddine
    Le Traon, Yves
    REQUIREMENTS ENGINEERING, 2015, 20 (04) : 363 - 382
  • [33] Conviviality-driven access control policy
    Donia El Kateb
    Nicola Zannone
    Assaad Moawad
    Patrice Caire
    Grégory Nain
    Tejeddine Mouelhi
    Yves Le Traon
    Requirements Engineering, 2015, 20 : 363 - 382
  • [34] Access Control Policy Based on Friend Circle
    Liu, Qin
    Ma, Tinghuai
    Xing, Fan
    Tian, Yuan
    Al-Dhelaan, Abdullah
    Al-Dhelaan, Mohammed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 62 (03): : 1143 - 1159
  • [35] Quantitative Policy Repair for Access Control on the Cloud
    Eiers, William
    Sankaran, Ganesh
    Bultan, Tevfik
    PROCEEDINGS OF THE 32ND ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2023, 2023, : 564 - 575
  • [36] Policy Architecture for Credential Based Access Control in Open Access Environment
    Dagdee, Nirmal
    Vijaywargiya, Ruchi
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (01): : 39 - 47
  • [37] Access Control Policy Analysis and Access Denial Method for Cloud Services
    Chi-Lun Liu
    Journal of Electronic Science and Technology, 2013, (02) : 176 - 180
  • [38] A certified access control policy language: TEpla
    Eaman, Amir
    Felty, Amy
    INNOVATIONS IN SYSTEMS AND SOFTWARE ENGINEERING, 2024, 20 (01) : 49 - 64
  • [39] Access Control and Data Security in Online Document Verification System
    Reddy, Ravinder B.
    Kumar, Pavan C.
    Singh, Rajrupa
    Selvakumar, R.
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH, 2016, : 725 - 729
  • [40] A Fully Decentralized Architecture for Access Control Verification in Serverless Environments
    Sabbioni, Andrea
    Mazzocca, Carlo
    Colajanni, Michele
    Montanari, Rebecca
    Corradi, Antonio
    2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,