Proceedings of the 2006 International Symposium on Software Testing and Analysis 2006
DOI: 10.1145/1146238.1146253
|View full text |Cite
|
Sign up to set email alerts
|

Role-Based access control consistency validation

Abstract: Modern enterprise systems support Role-Based Access Control (RBAC). Although RBAC allows restricting access to privileged operations, a deployer may actually intend to restrict access to privileged data. This paper presents a theoretical foundation for correlating an operation-based RBAC policy with a data-based RBAC policy. Relying on a locationconsistency property, this paper shows how to infer whether an operation-based RBAC policy is equivalent to any databased RBAC policy. We have built a static analysis … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0
1

Year Published

2007
2007
2020
2020

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 25 publications
(19 citation statements)
references
References 28 publications
0
18
0
1
Order By: Relevance
“…ESPE's security analysis engine relies on a Java EE bytecode analysis system called T. J. Watson Libraries for Analysis (WALA), developed at IBM Research [29] and formerly known as DOMO [3]. WALA provides a range of call graph construction algorithms, ranging from class hierarchy analysis [6] to control-flow analysis with a variety of context-sensitivity policies [10].…”
Section: Call Graph Constructionmentioning
confidence: 99%
“…ESPE's security analysis engine relies on a Java EE bytecode analysis system called T. J. Watson Libraries for Analysis (WALA), developed at IBM Research [29] and formerly known as DOMO [3]. WALA provides a range of call graph construction algorithms, ranging from class hierarchy analysis [6] to control-flow analysis with a variety of context-sensitivity policies [10].…”
Section: Call Graph Constructionmentioning
confidence: 99%
“…1a defines permissions [6] for the Emergency Room Collaboration (ERC) has CS Triage (others not shown). Triage negates permission getBillingHistory and getAppointmentHistory.…”
Section: Uml Role and Team Slice Diagrammentioning
confidence: 99%
“…Given a field f of a class, Checker A in Figure 2 scans all the code that can access the field in the public methods within the class and then determines whether a write operation is executed on the given field f. A conservative algorithm for implementing Checker A is proposed in [6]. Checker B relies on escape information and class type to determine mutability for a field.…”
Section: Checker B [Escape-modificationmentioning
confidence: 99%