Semantic access control model:: A formal specification

被引:0
作者
Yagüe, MI [1 ]
Gallardo, MD [1 ]
Maña, A [1 ]
机构
[1] Univ Malaga, Dpto Lenguajes & Ciencias Computac, Malaga 29071, Spain
来源
COMPUTER SECURITY - ESORICS 2005, PROCEEDINGS | 2005年 / 3679卷
关键词
Access Control; authorization; distributed systems security; formal methods in security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Semantic Access Control Model (SAC), built on the basis of separation of the authorization and access control management responsibilities, provides adequate solutions to the problems of access control in distributed and dynamic systems with heterogeneous security requirements. SAC is characterized by its flexibility for accommodating dissimilar security policies, but also by the ease of management-and control over a large number of distributed elements and the support for interoperability of authorization mechanisms. In this paper, we present the semantic validation algorithms developed in SAC to detect semantically incomplete or incorrect access control policies. Additionally, the formal model of SAC along with some proofs of its soundness is introduced. This formalization is the basis for additional model checking of the semantic validation algorithms developed.
引用
收藏
页码:24 / 43
页数:20
相关论文
共 23 条
[1]  
BARAANI A, 1996, SECURITY DATABASES S
[2]   Securing XML documents with author-X [J].
Bertino, E ;
Castano, S ;
Ferrari, E .
IEEE INTERNET COMPUTING, 2001, 5 (03) :21-31
[3]   Decentralized trust management [J].
Blaze, M ;
Feigenbaum, J ;
Lacy, J .
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, :164-173
[4]  
BLAZE M, 1993, SECURE INTERNET PROG, P185
[5]   The PERMIS X.509 role based privilege management infrastructure [J].
Chadwick, DW ;
Otenko, A .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2003, 19 (02) :277-289
[6]  
Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
[7]   A logical language for expressing authorizations [J].
Jajodia, S ;
Samarati, P ;
Subrahmanian, VS .
1997 IEEE SYMPOSIUM ON SECURITY AND PRIVACY - PROCEEDINGS, 1997, :31-42
[8]  
Kudo M., 2000, P 7 ACM C COMPUTER C, P87
[9]   Integrating PMI services in CORBA applications [J].
Lòpez, J ;
Maña, A ;
Ortega, JJ ;
Troya, JM ;
Yagüe, MI .
COMPUTER STANDARDS & INTERFACES, 2003, 25 (04) :391-409
[10]  
MANA A, 2003, P IASTED INT C COMM, P283