Verification and enforcement of access control policies

被引:0
作者
Antonio Cau
Helge Janicke
Ben Moszkowski
机构
[1] De Montfort University,Software Technology Research Laboratory
来源
Formal Methods in System Design | 2013年 / 43卷
关键词
Access control policy; Policy enforcement; Policy verification; Binary decision diagram;
D O I
暂无
中图分类号
学科分类号
摘要
Access control mechanisms protect critical resources of systems from unauthorized access. In a policy-based management approach, administrators define user privileges as rules that determine the conditions and the extent of users’ access rights. As rules become more complex, analytical skills are required to identify conflicts and interactions within the rules that comprise a system policy—especially when rules are stateful and depend on event histories. Without adequate tool support such an analysis is error-prone and expensive. In consequence, many policy specifications are inconsistent or conflicting that render the system insecure. The security of the system, however, does not only depend on the correct specification of the security policy, but in a large part also on the correct interpretation of those rules by the system’s enforcement mechanism.
引用
收藏
页码:450 / 492
页数:42
相关论文
共 50 条
  • [31] From ASTD Access Control Policies to WS-BPEL Processes Deployed in a SOA Environment
    Jiague, Michel Embe
    Frappier, Marc
    Gervais, Frederic
    Laleau, Regine
    St-Denis, Richard
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2010 WORKSHOPS, 2011, 6724 : 126 - +
  • [32] Enforcement of dynamic HTTP policies on resource-constrained residential gateways
    Bonafiglia, Roberto
    Sapio, Amedeo
    Baldi, Mario
    Risso, Fulvio
    Pomi, Paolo C.
    COMPUTER NETWORKS, 2017, 123 : 169 - 183
  • [33] Internet Routing Policies Verification Method Based On AS Relationships
    Zhai Peng
    Zhang Liping
    Qi Lu
    Luo Feng
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON LOGISTICS, ENGINEERING, MANAGEMENT AND COMPUTER SCIENCE, 2014, 101 : 880 - 883
  • [34] A Trustworthy Usage Control Enforcement Framework
    Neisse, Ricardo
    Pretschner, Alexander
    Di Giacomo, Valentina
    INTERNATIONAL JOURNAL OF MOBILE COMPUTING AND MULTIMEDIA COMMUNICATIONS, 2013, 5 (03) : 34 - 49
  • [35] Enforcing a Risk Assessment Approach in Access Control Policies Management: Analysis, Correlation Study and Model Enhancement
    Evina, Pierrete Annie
    Ayachi, Faten Labbane
    Jaidi, Faouzi
    Bouhoula, Adel
    2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 1866 - 1871
  • [36] Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications
    Compagna, Luca
    dos Santos, Daniel R.
    Ponta, Serena Elisa
    Ranise, Silvio
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 321 - 328
  • [37] Semantic Security: Specification and Enforcement of Semantic Policies for Security-driven Collaborations
    Sinnott, R. O.
    Doherty, T.
    Gray, N.
    Lusted, J.
    HEALTHGRID RESEARCH, INNOVATION AND BUSINESS CASE, 2009, 147 : 201 - +
  • [38] An Enforcement Architecture for Security and Trust Policies in Federated Web-service-based Systems
    Wu, Zhengping
    Wang, Lifeng
    2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, 2009, : 1002 - 1007
  • [39] Access Control Models
    Penelova, Maria
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2021, 21 (04) : 77 - 104
  • [40] 3PAC: Enforcing access policies for web services
    van Bemmel, J
    Wegdam, M
    Lagerberg, K
    2005 IEEE International Conference on Web Services, Vols 1 and 2, Proceedings, 2005, : 589 - 596