Proceedings of the 18th ACM Symposium on Access Control Models and Technologies 2013
DOI: 10.1145/2462410.2462413
|View full text |Cite
|
Sign up to set email alerts
|

Heuristic safety analysis of access control models

Abstract: Model-based security engineering uses formal security models for specifying and analyzing access control systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world access control systems generally are quite large and complex and require models that have high expressive power. On the other hand, analysis of such models is often pestered by computational complexity or even non-decidability, making it difficult to devise algorithms for automated analysis tools.One app… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 27 publications
0
8
0
Order By: Relevance
“…Proof: [Lemma 1] For the left-to-right implication, let a H = (ty, C a , ts rule , C, ts r , r) and ty = can_assign. 4 Since (RS , TUA, TRH , t) → a H (RS , TUA , TRH , t) and recalling Definition 17 of → AT RBACH , we have the following:…”
Section: Correctness Of τ H2fmentioning
confidence: 99%
See 1 more Smart Citation
“…Proof: [Lemma 1] For the left-to-right implication, let a H = (ty, C a , ts rule , C, ts r , r) and ty = can_assign. 4 Since (RS , TUA, TRH , t) → a H (RS , TUA , TRH , t) and recalling Definition 17 of → AT RBACH , we have the following:…”
Section: Correctness Of τ H2fmentioning
confidence: 99%
“…To overcome this issue, two alternative approaches are available: either (a) identify a fragment of the access control policies admitting a decision procedure for a restricted version of the safety problem or (b) consider unrestricted policies and design heuristic (albeit incomplete) methods capable of solving practically relevant instances of the general safety problem. For instance, several techniques for alternative (a) have been proposed for administrative models of Role-Based Access Control (RBAC) policies [33] as witnessed by a long stream of papers, e.g., [21,3,38,24,39,6,1,7,18,15,31,28,44]; whereas alternative (b) has been less investigated (see, e.g., [4,5]).…”
Section: Introductionmentioning
confidence: 99%
“…This enables tractability of the original, merely semi-decidable safety property and naturally yields an approximate solution. 1 Our most promising approach to heuristic analysis, DepSearch [3], is therefore generalized in this paper to fit any core-based entity labeling model. The notion of safety used in our approach is based on Tripunitara's and Li's [33] precise and meaningful revisions of the original safety-definition.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we discuss the basic idea of heuristic safety analysis. We will outline one of the most successful algorithmic approaches to this problem, DepSearch, presented for the HRU access control model in [3,4]. On this basis, we will later introduce a systematic generalization of DepSearch.…”
Section: Model Analysismentioning
confidence: 99%
See 1 more Smart Citation