2019
DOI: 10.1109/tse.2017.2765640
|View full text |Cite
|
Sign up to set email alerts
|

A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies

Abstract: Abstract-Access control systems are widely used means for the protection of computing systems. They are defined in terms of access control policies regulating the access to system resources. In this paper, we introduce a formally-defined, fully-implemented framework for specification, analysis and enforcement of attribute-based access control policies. The framework rests on FACPL, a language with a compact, yet expressive, syntax for specification of real-world access control policies and with a rigorously de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0
1

Year Published

2020
2020
2020
2020

Publication Types

Select...
3
2
2

Relationship

3
4

Authors

Journals

citations
Cited by 20 publications
(20 citation statements)
references
References 48 publications
(178 reference statements)
0
19
0
1
Order By: Relevance
“…As formally proved in [16], these constraints ensure that the corresponding FACPL (and, hence, XACML) policy evaluates an request to a certain decision dec if and only if the constraint c corresponding to dec is satisfiable with respect to the request. Therefore, once the Analyser receives the sensed request req and its response res, it first translates req into a set of SMT assertions, say c req , modelling the attributes forming the requests.…”
Section: Algorithm 1 Access Logs Comparison Algorithmmentioning
confidence: 96%
See 3 more Smart Citations
“…As formally proved in [16], these constraints ensure that the corresponding FACPL (and, hence, XACML) policy evaluates an request to a certain decision dec if and only if the constraint c corresponding to dec is satisfiable with respect to the request. Therefore, once the Analyser receives the sensed request req and its response res, it first translates req into a set of SMT assertions, say c req , modelling the attributes forming the requests.…”
Section: Algorithm 1 Access Logs Comparison Algorithmmentioning
confidence: 96%
“…To this aim, there are available in the literature a few fullfledged analysis frameworks for XACML [14], [15], [16]. Differently from others, the framework in [16] enjoys the benefits of using formal method techniques to model and analyse XACML policies.…”
Section: A Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…Recent work by Margheri et al [31] proposes a framework for the specification, analysis, and enforcement of ABAC [25] (attributebased access control) policies; RBAC can be seen as a specific case of ABAC, where role is one of the attributes. In this work, both AC requests and policies are expressed in a high-level language called FACPL; they are then translated into constraints to be solved using an SMT solver.…”
Section: Related Workmentioning
confidence: 99%