General Methods for Access Control Policy Verification

被引:2
|
作者
Hu, Vincent C. [1 ]
Kuhn, D. Richard [1 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
来源
PROCEEDINGS OF 2016 IEEE 17TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION (IEEE IRI) | 2016年
关键词
Access Control; Authorization; Policy; Policy Verification; Policy Testing; Policy Tool; Model Checking;
D O I
10.1109/IRI.2016.49
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access control models are usually written, bridging the gap in abstraction between policies and mechanisms. Identifying discrepancies between policy specifications and their intended function is crucial because correct implementation and enforcement of policies by applications is based on the premise that the policy specifications are correct. As a result, policy specifications represented by models must undergo rigorous verification and validation through systematic verification and testing to ensure that the policy specifications truly encapsulate the desires of the policy authors. Verifying the conformance of access control policies and models is a non-trivial and critical task, and one important aspect of such verification is to formally check the inconsistency and incompleteness of the model and safety requirements of the policy, because an access control model and its implementation do not necessarily explicitly express the policy, which can also be implicitly embedded by mixing with direct access constraints or other access control models.
引用
收藏
页码:315 / 323
页数:9
相关论文
共 50 条
  • [41] A Formal Approach for the Verification of AWS IAM Access Control Policies
    Zahoor, Ehtesham
    Asma, Zubaria
    Perrin, Olivier
    SERVICE-ORIENTED AND CLOUD COMPUTING (ESOCC 2017), 2017, 10465 : 59 - 74
  • [42] Verification of Information Flow and Access Control Policies with Dependent Types
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 165 - 179
  • [43] Automated verification of access control policies using a SAT solver
    Graham Hughes
    Tevfik Bultan
    International Journal on Software Tools for Technology Transfer, 2008, 10 (6) : 503 - 520
  • [44] Dynamic risk-based decision methods for access control systems
    Shaikh, Riaz Ahmed
    Adi, Kamel
    Logrippo, Luigi
    COMPUTERS & SECURITY, 2012, 31 (04) : 447 - 464
  • [45] Policy-based access control in Peer-to-Peer Grid systems
    da Silva, JF
    Gaspary, LP
    Barcellos, MP
    Detsch, A
    2005 6TH INTERNATIONAL WORKSHOP ON GRID COMPUTING (GRID), 2005, : 107 - 113
  • [46] Implementing Database Access Control Policy from Unconstrained Natural Language Text
    Slankas, John
    PROCEEDINGS OF THE 35TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2013), 2013, : 1357 - 1360
  • [47] Policy-based Access Control for DPWS-enabled Ubiquitous Devices
    Fysarakis, Konstantinos
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    Rantos, Konstantinos
    Sultatos, Othonas
    2014 IEEE EMERGING TECHNOLOGY AND FACTORY AUTOMATION (ETFA), 2014,
  • [48] Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space
    Cao, Yan
    Huang, Zhiqiu
    Kan, Shuanglong
    Fan, Dajuan
    Yang, Yang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 497 - 519
  • [49] A Framework for Design, Verification, and Management of SoC Access Control Systems
    Restuccia, Francesco
    Meza, Andres
    Kastner, Ryan
    Oberg, Jason
    IEEE TRANSACTIONS ON COMPUTERS, 2023, 72 (02) : 386 - 400
  • [50] Specification and Verification of a Topology-Aware Access Control Model for Cyber-Physical Space
    Yan Cao
    Zhiqiu Huang
    Shuanglong Kan
    Dajuan Fan
    Yang Yang
    TsinghuaScienceandTechnology, 2019, 24 (05) : 497 - 519