Towards Capability Policy Specification and Verification
نویسندگان
چکیده
The object-capability model is a de-facto industry standard widely adopted for the implementation of security policies for web based software. Unfortunately, code written using capabilities tends to concentrate on the low-level mechanism rather than the high-level policy, and the parts implementing the policy tend to be tangled with the parts implementing the functionality. In this paper we argue that the policies followed by programs using object capabilities should be made explicit and written separately from the code implementing them. We also argue that the specification of such capability policies requires concepts that go beyond the features of current specification languages. Moreover, we argue that we need methodologies with which to prove that programs adhere to their capability policies as specified. To write policy specifications, we propose execution abstractions, which talk about various properties of a program’s execution. We use execution abstractions to write the formal specification of five out of the six informal policies in the mint example, famous in the object capability literature. In these specifications, the conclusions but also the premises may relate to the state before as well as after execution, the code may be existentially or universally quantified, and interpretation quantifies over all modules extending the current module. In the process of writing these specifications, we uncovered several different and plausible alternative meanings for the policies of the mint example, and also discovered some new policies not mentioned in the original papers. Finally, we demonstrate how we can prove that the example implemented in Java satisfies the capability policies. These proofs make extensive use of the guarantees provided by type system features such as final and private. [Copyright notice will appear here once ’preprint’ option is removed.]
منابع مشابه
A model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملWeb Service Choreography Verification Using Z Formal Specification
Web Service Choreography Description Language (WS-CDL) describes and orchestrates the services interactions among multiple participants. WS-CDL verification is essential since the interactions would lead to mismatches. Existing works verify the messages ordering, the flow of messages, and the expected results from collaborations. In this paper, we present a Z specification of WS-CDL. Besides ve...
متن کاملPetri-net Based Modeling for Verification of RBAC Policies
Role based access control has emerged as a promising new approach to security for advanced applications because of the several benefits it provides. However, most of the research efforts in this area has been focused towards the specification and modeling of RBAC systems. The crucial issue of verification of role based access control policies has not been adequately investigated in the literatu...
متن کاملPolicy and Contract Management for Semantic Web Services
This paper summarizes our efforts to develop capabilities for policy and contract management for Semantic Web Services applications. KAoS services and tools allow for the specification, management, analyzes, disclosure and enforcement of policies represented in OWL. We discuss three current Semantic Web Services applications as examples of the kinds of roles that a policy management framework c...
متن کاملAbsorptive Capability and Competitive Advantage: Some Insights from Indian Pharmaceutical Industry
Every firm learns through firm specific methods. This learning process is operationalized by firm’s knowledge management practices. Therefore, knowledge to result in successful learning should be assisted by a combinative framework which can enhance a firms’ absorptive capability. This in turn will play a decisive role for achieving competitive advantage. Current literature in strategic managem...
متن کامل