A comprehensive approach to the automatic refinement and verification of access control policies

被引:11
作者
Cherninod, Manuel [2 ]
Durante, Luca [2 ]
Seno, Lucia [2 ]
Valenza, Fulvio [1 ,2 ]
Valenzano, Adriano [2 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, Turin, Italy
[2] CNR, IEIIT, Cso Duca Abruzzi 24, I-10129 Turin, Italy
关键词
Access control; Policy-based network management; Policy refinement; Policy verification; CLASSIFICATION; RESOLUTION; MANAGEMENT;
D O I
10.1016/j.cose.2018.09.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is one of the building blocks of network security and is often managed by network administrators through the definition of sets of high-level policies meant to regulate network behavior (policy-based management). In this scenario, policy refinement and verification are important processes that have to be dealt with carefully, possibly relaying on computer-aided automated software tools. This paper presents a comprehensive approach for access control policy refinement, verification and, in case errors are detected in the policy implementation, their fixing. The proposed methodology is based on a twofold model able to describe both policies and system configurations and allows, by suitably processing the model, to either propose a system configuration that correctly enforces the policies, or determine whether a specific implementation matches the policy specification also providing hints on how possible anomalies can be fixed. Results on the average complexity of the solution confirm its feasibility in terms of computation time, even for complex networked systems consisting of several hundred nodes. (C) 2018 Elsevier Ltd. All rights reserved.
引用
收藏
页码:186 / 199
页数:14
相关论文
共 33 条
  • [1] Abadi Martin., 2003, Proceedings of the 10th Annual Network and Distributed System Security Symposium, P107
  • [2] [Anonymous], REFINEMENT HIST BASE
  • [3] [Anonymous], P 2 ACM WKSP ASS US
  • [4] [Anonymous], 2018, 2018 14 IEEE INT WOR, DOI DOI 10.1109/WFCS.2018.8402339
  • [5] [Anonymous], 2001, LECT NOTES COMPUT SC, DOI DOI 10.1007/3-540-45608-2_3
  • [6] Aqib Muhammad, 2014, International Journal of Computer Network and Information Security, V7, P54, DOI 10.5815/ijcnis.2015.01.08
  • [7] A goal-based approach to policy refinement
    Bandara, AK
    Lupu, EC
    Moffett, J
    Russo, A
    [J]. FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 229 - 239
  • [8] Assessing network authorization policies via reachability analysis
    Basile, Cataldo
    Canavese, Daniele
    Pitscheider, Christian
    Lioy, Antonio
    Valenza, Fulvio
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 110 - 131
  • [9] A novel approach for integrating security policy enforcement with dynamic network virtualization
    Basile, Cataldo
    Lioy, Antonio
    Pitscheider, Christian
    Valenza, Fulvio
    Vallini, Marco
    [J]. 2015 1ST IEEE CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT), 2015,
  • [10] Bera P., 2010, IEEE Transactions on Network and Service Management, V7, P231, DOI 10.1109/TNSM.2010.1012.0365