2013
DOI: 10.1109/tdsc.2013.18
|View full text |Cite
|
Sign up to set email alerts
|

Discovery and Resolution of Anomalies in Web Access Control Policies

Abstract: Abstract-Emerging computing technologies such as web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effectively. However, we still suffer from unintended security leakages by unauthorized actions in business services while providing more convenient services to Internet users through such a cutting-edge technological growth. Furthermore, designing and managing web access control policies are often error-prone due to the lack of effec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
31
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 44 publications
(31 citation statements)
references
References 24 publications
(43 reference statements)
0
31
0
Order By: Relevance
“…(2) The second group put forward policy redundancy detecting methods by establishing research models and relevant mechanisms. Aiming at this problem, Hu et al [23] indicated that the Internet provides users with more convenient services, and at the same time the information system suffers from security attacks caused by unauthorized operations in business service. Besides, the design and management of the Web access control policy are always prone to errors for lack of efficient analysis mechanisms and tools.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%
“…(2) The second group put forward policy redundancy detecting methods by establishing research models and relevant mechanisms. Aiming at this problem, Hu et al [23] indicated that the Internet provides users with more convenient services, and at the same time the information system suffers from security attacks caused by unauthorized operations in business service. Besides, the design and management of the Web access control policy are always prone to errors for lack of efficient analysis mechanisms and tools.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%
“…There have also been significant advances in the area of policy conflict detection and resolution in relation with network policy such as [4] [5] [12] [13]. The novel policy conflict and anomaly detection techniques coupled with the resolution strategies have been proposed in [13].…”
Section: Related Workmentioning
confidence: 99%
“…Margrave uses MTBDDs to supports two types of analysis: policy querying, which analyzes access requests evaluated to a certain decision, and change-impact analysis, which is used to compare policies. Another policy analysis tool that employs BDDs for the encoding of XACML policies is XAnalyzer [15]. XAnalyzer uses a policy-based segmentation technique to detect and resolve policy anomalies such as redundancy and conflicts.…”
Section: Related Workmentioning
confidence: 99%
“…This need has spurred the development of several methods and tools for the verification of policy specifications at design time using formal reasoning [4,8,11,15,16]. The security properties being verified can express requirements on the policies but also on relations between policies.…”
Section: Introductionmentioning
confidence: 99%