Verification and enforcement of access control policies

被引:0
|
作者
Antonio Cau
Helge Janicke
Ben Moszkowski
机构
[1] De Montfort University,Software Technology Research Laboratory
来源
Formal Methods in System Design | 2013年 / 43卷
关键词
Access control policy; Policy enforcement; Policy verification; Binary decision diagram;
D O I
暂无
中图分类号
学科分类号
摘要
Access control mechanisms protect critical resources of systems from unauthorized access. In a policy-based management approach, administrators define user privileges as rules that determine the conditions and the extent of users’ access rights. As rules become more complex, analytical skills are required to identify conflicts and interactions within the rules that comprise a system policy—especially when rules are stateful and depend on event histories. Without adequate tool support such an analysis is error-prone and expensive. In consequence, many policy specifications are inconsistent or conflicting that render the system insecure. The security of the system, however, does not only depend on the correct specification of the security policy, but in a large part also on the correct interpretation of those rules by the system’s enforcement mechanism.
引用
收藏
页码:450 / 492
页数:42
相关论文
共 50 条
  • [21] Quality Analysis for Scientific Workflow Provenance Access Control Policies
    Bhuyan, Fahima Amin
    Lu, Shiyong
    Reynolds, Robert
    Ahmed, Ishtiaq
    Zhang, Jia
    2018 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (IEEE SCC 2018), 2018, : 261 - 264
  • [22] Run-Time Enforcement of Nonsafety Policies
    Ligatti, Jay
    Bauer, Lujo
    Walker, David
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2009, 12 (03)
  • [23] Oblivious access control policies for cloud based data sharing systems
    Pervez, Zeeshan
    Khattak, Asad Masood
    Lee, Sungyoung
    Lee, Young-Koo
    Huh, Eui-Nam
    COMPUTING, 2012, 94 (12) : 915 - 938
  • [24] Oblivious access control policies for cloud based data sharing systems
    Zeeshan Pervez
    Asad Masood Khattak
    Sungyoung Lee
    Young-Koo Lee
    Eui-Nam Huh
    Computing, 2012, 94 : 915 - 938
  • [25] Abductive Analysis of Administrative Policies in Rule-Based Access Control
    Gupta, Puneet
    Stoller, Scott D.
    Xu, Zhongyuan
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) : 412 - 424
  • [26] Verification of Cloud Security Policies
    Miller, Loic
    Merindol, Pascal
    Gallais, Antoine
    Pelsser, Cristel
    2021 IEEE 22ND INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE SWITCHING AND ROUTING (IEEE HPSR), 2021,
  • [27] Automatic Extraction of Access Control Policies from Natural Language Documents
    Narouei, Masoud
    Takabi, Hassan
    Nielsen, Rodney
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (03) : 506 - 517
  • [28] Detection of Multiple-Duty-Related Security Leakage in Access Control Policies
    Hwang, JeeHyun
    Xie, Tao
    Hu, Vincent C.
    2009 THIRD IEEE INTERNATIONAL CONFERENCE ON SECURE SOFTWARE INTEGRATION AND RELIABILITY IMPROVEMENT, PROCEEDINGS, 2009, : 65 - 74
  • [29] Representing Flexible Role-Based Access Control Policies Using Objects and Defeasible Reasoning
    Basseda, Reza
    Gao, Tiantian
    Kifer, Michael
    Greenspan, Steven
    Chell, Charley
    RULE TECHNOLOGIES: FOUNDATIONS, TOOLS, AND APPLICATIONS, 2015, 9202 : 376 - 387
  • [30] A Nature-Inspired Framework for Optimal Mining of Attribute-Based Access Control Policies
    Narouei, Masoud
    Takabi, Hassan
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT II, 2019, 305 : 489 - 506