Improving Manageability of Access Control Policies
نویسندگان
چکیده
Applications are continuously increasing in both complexity and number of users they serve. Moreover, the set of applications used by organizations is continuously expanding. This poses challenges, not in the least with regard to access control. More specifically, manageability of access control policies becomes more difficult. This leads to administrative overhead and challenges in enforcing a consistent security policy. The goal of this PhD project is to increase manageability of access control by supporting refinement of application-specific access control policies from explicitly specified organization-wide security policies. This paper provides an overview of the challenges and discusses the objectives we set in order to achieve it.
منابع مشابه
An automatic test case generator for evaluating implementation of access control policies
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...
متن کاملImproving Packet Filters Management through Automatic and Dynamic Schemes
The development of complex access control architectures raises the problem of their management. In this article, we describe an architecture providing packet filters configuration in Internet based networks. The performance of the access control process heavily depends on the number of rules used to define the access control service. Therefore an efficient access control architecture relies on ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کاملA model for specification, composition and verification of access control policies and its application to web services
Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...
متن کاملA Role-Based Approach to Restricting Application Execution
i Declaration This thesis is my own account of the research carried out by myself in 2005. Abstract As systems are becoming more interconnected, software is becoming less trustworthy and users are increasingly at greater risk of attack. Most operating systems allow programs to run with the full set of a user's permissions and this can result in malicious code with the ability to act outside of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014