2010 IEEE International Symposium on Policies for Distributed Systems and Networks 2010
DOI: 10.1109/policy.2010.22
|View full text |Cite
|
Sign up to set email alerts
|

ACPT: A Tool for Modeling and Verifying Access Control Policies

Abstract: Access control mechanisms are a widely adopted technology for information security. Since access decisions (i.e., permit or deny) on requests are dependent on access control policies, ensuring the correct modeling and implementation of access control policies is crucial for adopting access control mechanisms. To address this issue, we develop a tool, called ACPT (Access Control Policy Testing), that helps to model and implement policies correctly during policy modeling, implementation, and verification.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
23
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 35 publications
(24 citation statements)
references
References 8 publications
0
23
0
Order By: Relevance
“…Specifically, SAX stream API is employed as the parser to load an RBAC policy in XML (e.g. created by ACPT [26]) and produce the adjacency list A G . In turn, the T G is computed from the A G .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, SAX stream API is employed as the parser to load an RBAC policy in XML (e.g. created by ACPT [26]) and produce the adjacency list A G . In turn, the T G is computed from the A G .…”
Section: Methodsmentioning
confidence: 99%
“…The technique is to verify specified AC properties against AC models using a black-box model checking method [5]. An implementationAccess Control Policy Tool (ACPT) [26] is developed by NIST Computer Security Division in corporation of North Carolina State University.…”
Section: Related Workmentioning
confidence: 99%
“…In our work [7], we apply modeling checking tool ACPT (access control policy testing) [38] to specify policy models and their properties during policy modeling to assure that WBAC policies satisfy the security properties intended by the model.…”
Section: T) ∧ P Er-t R-a(tr Evaluator = {(Read Obj B ) (Write Obj mentioning
confidence: 99%
“…The technique is to verify specified AC properties against AC models using a black-box model checking method [6]. An implementation --Access Control Policy Tool (ACPT) [23] is developed by NIST Computer Security Division in corporation of North Carolina State University.…”
Section: Fig 4 Operational Environmentmentioning
confidence: 99%