The Design and Demonstration of an Actor-Based, Application-Aware Access Control Evaluation Framework

نویسندگان

  • William C. Garrison
  • Adam J. Lee
  • Timothy L. Hinrichs
چکیده

To date, most work regarding the formal analysis ofaccess control schemes has focused on quantifying and comparingthe expressive power of a set of schemes. Although expressivepower is important, it is a property that exists in an absolutesense, detached from the application-specific context within whichan access control scheme will ultimately be deployed. In thispaper, by contrast, we formalize the access control suitabilityanalysis problem, which seeks to evaluate the degree to whicha set of candidate access control schemes can meet the needsof an application-specific workload. This process involves bothreductions to assess whether a scheme is capable of implementinga workload, as well as cost analysis using ordered measuresto quantify the overheads of using each candidate scheme toservice the workload. We develop a mathematical frameworkfor analyzing instances of the suitability analysis problem, andevaluate this framework both formally (by quantifying its effi-ciency and accuracy properties) and practically (by exploringa group-based messaging workload from the literature). Anancillary contribution of our work is the identification of auxiliarymachines, which are a useful class of modifications that can bemade to enhance the expressive power of an access control schemewithout negatively impacting the safety properties of the scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

A new SDN-based framework for wireless local area networks

Nowadays wireless networks are becoming important in personal and public communication andgrowing very rapidly. Similarly, Software Dened Network (SDN) is an emerging approach to over-come challenges of traditional networks. In this paper, a new SDN-based framework is proposedto ne-grained control of 802.11 Wireless LANs. This work describes the benets of programmableAcc...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Design and Evaluation of an mHealth Application in Self-Management of Post-Traumatic Stress Disorder

Introduction: Recent developments in the use of mobile technologies have given rise to opportunities for more effective and cost-efficient services for people with chronic diseases. Considering the relatively high prevalence of post-traumatic stress disorder (PTSD) in Iran and the lack of a native application for the self-management of many complications of this disorder, the present study aims...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1302.1134  شماره 

صفحات  -

تاریخ انتشار 2013