2017
DOI: 10.1016/j.cose.2017.01.009
|View full text |Cite
|
Sign up to set email alerts
|

Formal analysis of XACML policies using SMT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Wang et al [10] realized data storage and sharing without the participation of providers, using Ethereum and an attributebased access control method. Furthermore, many other researchers have studied the access control strategy described by XACML about Policies formalization [11], Automatic Testing [12], Model testing [13], policy tracing [14], automated fault localization [15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Wang et al [10] realized data storage and sharing without the participation of providers, using Ethereum and an attributebased access control method. Furthermore, many other researchers have studied the access control strategy described by XACML about Policies formalization [11], Automatic Testing [12], Model testing [13], policy tracing [14], automated fault localization [15].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Extensible access control markup language (XACML) standards include both access control (authorisation) and data management based on XML in the different systems [25]. Effectively, XACML offers features for data access and authorisation for the users at the fine-grained level, which is the most flexible and effective [26,27,28]. This technology is presented by the organization for the advancement of structured information standards (OASIS).…”
Section: Overview Of Security and Privacy Techniques In Ehr Systemsmentioning
confidence: 99%
“…However these same features can also make authoring XAMCL policies prone to human error. Turkmen et al [13] present a formal analysis of XACML policies by encoding them into Satisfiability Modulo Theories (SMT) formulas, facilitating formal policy analysis while relieving authors of the burden of manually proving soundness gradually. While this work remains more general in terms of access control definitions, our work additionally affords soundness checks for provisioned permissions in addition to the Policy Decision Point (PDP) logic, given that XACML is applicable to profile definitions, yet not for provisioning such profile to identities.…”
Section: Formal Verification For Xacmlmentioning
confidence: 99%