An access control framework for security policies with complex constraints

نویسنده

  • Carlos Nuno da Cruz Ribeiro
چکیده

Most of current access control systems are not expressive enough for current applications, in the sense that they cannot express several access control policies required by them. Most of these applications have no choice but to build their owned very specific access control systems completely independently from other applications running on the same environment, which entails potential incoherencies and management problems. Thus the development of expressive access control systems able to accommodate the needs of current applications is essential. However, the increment on expressiveness should not compromise the performance of the mechanisms which enforce the policies, neither should it contribute for the incoherency of those policies. In this dissertation it is developed an access control framework which is flexible enough to accommodate most access control policies required by current applications and simultaneously ensures coherency and performance of policy enforcement. The framework is capable to express and enforce several access control policies which are usually only expressed and enforce within specific applications. Namely, history-based policies and obligation-based policies. The complexity and size of access control policies for large organizations raises scale problems both in terms of performance and in terms of policy design. The developed framework addresses both issues. The first one is minimized by an index generated by the policy language compiler developed within the framework. The second is minimized by the structure of the policy language itself, which allows for composition and redefinition of access control policies. The coherency of access control policies expressed and enforced by the framework is achieved by a incoherency detection tool which is able to detect several types of policy incoherencies, including several identified by this dissertation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

An Effective Modality Conflict Model for Identifying Applicable Policies During Policy Evaluation

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

متن کامل

Formal Analysis of Security Policy Implementations in Enterprise Networks

The management of security, operations and services in large scale enterprise networks is becoming more difficult due to complex security policies of the organizations and also due to dynamic changes in network topologies. Typically, the global security policy of an enterprise network is implemented in a distributed fashion through appropriate sets of access control rules (ACL rules) across var...

متن کامل

A combination of semantic and attribute-based access control model for virtual organizations

A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002