A Comparative Analysis of Access Control Policy Modeling Approaches

نویسندگان

  • K. Shantha Kumari
  • T. Chithralekha
چکیده

Access control policies (ACPs) characterize the high-level rules according to which the access control of a system is regulated. Generally they are defined separately from the functional requirements (FRs) of an application and added to the system as an afterthought after being built. But, many problems arose during the integration of ACPs and FRs. Hence, over the past years, researchers have suggested for the modifying the design phase to include an earlier focus on access control issues through various modeling techniques. This paper reviews the important approaches in ACP modeling and makes a comparative analysis of the advantages and limitations of those techniques especially in addressing complex ACPs. Based on the comparative analysis, this paper presents directions for further work needed in handling the intricate nature of today’s ACPs. DOI: 10.4018/jsse.2012100104 66 International Journal of Secure Software Engineering, 3(4), 65-83, October-December 2012 Copyright © 2012, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. plicated for understanding and analyzing. This inconsistency issues are not addressed in the traditional approach of software development and this would result in a design with errors as given by Georg, Ray, and France (2002). Late analysis of ACP can generate conflicts between security needs and functional requirements of the system. Georg, G et al states that this leads to security failures, violations from the access control rules, leakage of vital information etc. This problem was sorted out by externalizing the ACPs as presented by Saltzer and Schroeder (1975), Sirer, Grimm, Gregory, Anderson, and Bershad (1996), and Grimm and Bershad (1996). An additional advantage is that changes to policies can then be performed without the need to modify applications. Since they ACPs are separated from applications, they can be rebuilt, shared, and thus reused. But the independent specification of security policies presents a problem—how to integrate the policies in an application design. Another solution was proposed by the research community for dealing with the intricate ACPs and also to avoid the inconsistency issues to address the ACPs from the initial phase of the system development. Addressing the ACPs in the earlier phases is one of today’s challenges in software and requirements engineering research. But Access control mechanisms cannot be blindly inserted into a security-critical system. The Access control requirements can be formulated and integrated into system designs using a high level of abstraction. In this way, it becomes possible to develop security aware applications that are designed with the goal to have consistent access control even during complex situations. To properly address security risks and vulnerabilities without jeopardizing speed or cost, organizations must bring security into the development process and this proved to be effective. Hence, the process of integrating the ACPs with the FRs was recommended in many research works. As a case of representation, the works by Kim, Ray, France, and Li (2004), Priebe, Fernandez, Mehlau, and Pernul (2004), Lodderstedt, Basin, and Doser (2002), Jurjens (2002), and Doan, Michel, and Demurjian (2006) can be taken. From a software design perspective, access control policies are requirements that must be addressed in a design phase. This also provides an insight to the various kinds of threats, violations that can be well handled in the design phase of the software development. The overall system development process is fruitful when the design phase supports integrated modeling of ACPs and FRs. Hence defining the ACPs in the same way as the FRs in the Design phase is considered as a prudent way. The modeling process should be expressive and flexible enough to accommodate all the different requirements that may need to be expressed, while at the same time be simple both in terms of use and implementation (so that it can be verified with ease). The integrated development of ACPs with the FRs is also applicable from the requirements phase. This paper focuses on the research work done in combined presentation of ACP with FR at Design phase, as this phase talks more about solution space. Existing research works in this area presents various modeling approaches that defined ACPs as like FRs at design level. These approaches have taken care of the proper abstraction of ACPs and the process of modeling without losing the inconsistency of the FRs. This paper focuses on the premier research works available in ACP modeling at design level either using Model-based approaches or Process –based approaches. Other methods include – Formal representation of ACPs and High level languages [HLLs] for policy specification. Logic-based languages have proved to be attractive for the specification of security policy, as they have a well understood formalism. The Formal representation of Logic based approaches have the advantage of clear representation and also they are amenable to analysis. However they can be difficult to use and are not always directly translatable into efficient implementation. HLLs are also used for representing the access control functionality at the design level. They are easy to express but not amenable for analysis. This review is based on Ray, Li, France, and Kim (2004).But Model-based and Process-based approaches are both simple in expressing and also effective in analyzing the ACPs when compared to Formal 17 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/comparative-analysis-accesscontrol-policy/74845?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Computer Science, Security, and Information Technology. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Can “feature” Be Used to Model the Changing Access Control Policies?

Access control policies [ACPs] regulate the access to data and resources in information systems. These ACPs are framed from the functional requirements and the Organizational security & privacy policies. It was found to be beneficial, when the ACPs are included in the early phases of the software development leading to secure development of information systems. Many approaches are available for...

متن کامل

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

Access and Mobility Policy Control at the Network Edge

The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...

متن کامل

A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain

The importance of electronic healthcare has caused numerous changes in both substantive and procedural aspects of healthcare processes. These changes have produced new challenges for patient privacy and information secrecy. Traditional privacy policies cannot respond to rapidly increased privacy needs of patients in electronic healthcare. Technically enforceable privacy policies are needed in o...

متن کامل

Modeling of Growth and Welfare Effects of Tax Reform in Iran: A Static Computable General Equilibrium Analysis

F or several decades, the selection of a proper tax base has been among the most serious concerns for the economic policy makers. The computable general equilibrium models analysis provides a comprehensive framework for the investigation of the effects of the adopted policies on the economy of a country. In the present study, using a static computable general equilibrium, the effects of tax ref...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJSSE

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2012