An Approach to Formally Validate and Verify the Compliance of Low Level Access Control Policies

被引:3
作者
Jaidi, Faouzi [1 ]
Labbene Ayachi, Faten [1 ]
机构
[1] Higher Sch Commun Tunis SupCom, DSRU, Tunis, Tunisia
来源
2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE) | 2014年
关键词
database security; formal validation; conformity verification; RBAC; access control policy integrity; SECURITY; MODELS; UML;
D O I
10.1109/CSE.2014.287
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Our research works are in the context of the integrity verification and optimization of access control policies in relational database management systems (RDBMSs). Indeed, resources in charge of administrating access control policies, like DBMSs, can easily permit the following malfunctions. (1) The record of illegal updates leading to a non-compliance of the policy regarding its original specification. This can occur after an intrusion attempt or an illegal delegation of rights. (2) The implementation of more than a unique access control model such as RBAC, DAC, etc. This situation can lead to redundancy, inconsistency or contradiction in the expression of the policy. (3) The exposure of the database to inner threats relative to illegal updates or access paradoxically made by authorized users. These vulnerabilities joined with challenges in the management of the policy, related to the evolution of access control models to fine grained access control, can easily corrupt the compliance of the policy. Hence, an important aspect is to help security architects verifying the correspondence and establishing the equivalence between the security planning and its real implementation. In this paper, we introduce our approach to address this problem. We transform the high level and the low level policies in a logic-like formalism that offers a solid environment to verify and validate properties of access control policies.
引用
收藏
页码:1550 / 1557
页数:8
相关论文
共 35 条
[1]  
Abrial Jean-Raymond, 1996, The B-Book - Assigning Programs to Meanings
[2]  
[Anonymous], 1997, Handbook of Graph Grammars and Computing by Graph Transformations: Foundations
[3]  
[Anonymous], MTR2997
[4]  
[Anonymous], ANR08SEGI018
[5]  
[Anonymous], THESIS
[6]  
Baldwin R. W., 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.90CH2884-5), P116, DOI 10.1109/RISP.1990.63844
[7]   Model Driven Security: From UML models to access control infrastructures [J].
Basin, D ;
Doser, J ;
Lodderstedt, T .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) :39-91
[8]   Automated analysis of security-design models [J].
Basin, David ;
Clavel, Manuel ;
Doser, Juergen ;
Egea, Marina .
INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) :815-831
[9]   Access Control for Databases: Concepts and Systems [J].
Bertino, Elisa ;
Ghinita, Gabriel ;
Kamra, Ashish .
FOUNDATIONS AND TRENDS IN DATABASES, 2010, 3 (1-2) :1-148
[10]  
Cenys A., 2009, J ENG SCI TECHNOLOGY, V2, P48, DOI DOI 10.25103/JESTR.021.09