Security Analysis of Role-Based Access Control through Program Verification

被引:14
|
作者
Ferrara, Anna Lisa [1 ]
Madhusudan, P. [2 ]
Parlato, Gennaro [3 ]
机构
[1] Univ Bristol, Bristol BS8 1TH, Avon, England
[2] Univ Illinois, Urbana, IL USA
[3] Univ Southampton, Southampton, Hants, England
基金
美国国家科学基金会;
关键词
Access control; formal methods for security; SAFETY;
D O I
10.1109/CSF.2012.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction-based tools available for program verification. Our scheme uses a combination of abstraction and reduction to program verification to perform security analysis. We convert ARBAC policies to imperative programs that simulate the policy abstractly, and then utilize further abstract-interpretation techniques from program analysis to analyze the programs in order to prove the policies secure. We argue that the aggressive set-abstractions and numerical-abstractions we use are natural and appropriate in the access control setting. We implement our scheme using a tool called VAC that translates ARBAC policies to imperative programs followed by an interval-based static analysis of the program, and show that we can effectively prove access control policies correct. The salient feature of our approach are the abstraction schemes we develop and the reduction of role-based access control security (which has nothing to do with programs) to program verification problems.
引用
收藏
页码:113 / 125
页数:13
相关论文
共 50 条
  • [31] Application of an Improved Role-Based Access Control Model in OBS Security Mechanism
    Jiang, Xueying
    Zhang, Chengjun
    Liu, Kean
    Li, Shiyao
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL II, 2010, : 555 - 558
  • [32] A framework for implementing role-based access control using CORBA security service
    Beznosov, K
    Deng, Y
    FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 19 - 30
  • [33] Research on Security Status Recovery in Temporal Role-Based Access Control System
    Yu Wanjun
    Wang Yong
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
  • [34] Automated and Efficient Analysis of Role-Based Access Control with Attributes
    Armando, Alessandro
    Ranise, Silvio
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
  • [35] Security enhancement of a flexible payment scheme and its role-based access control
    Chang, Chin-Chen
    Cheng, Yi-Fang
    Lin, Iuon-Chang
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 457 - +
  • [36] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [37] ACCESS RIGHTS ADMINISTRATION IN ROLE-BASED SECURITY SYSTEMS
    NYANCHAMA, M
    OSBORN, SL
    DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 37 - 56
  • [38] A role-based access control policy verification framework for real-time systems
    Shafiq, B
    Masood, A
    Joshi, J
    Ghafoor, A
    WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings, 2005, : 13 - 20
  • [39] Modeling, conflict detection, and verification of a new virtualization role-based access control framework
    Luo, Yang
    Xia, Chunhe
    Lv, Liangshuang
    Wei, Zhao
    Li, Yazhuo
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1904 - 1925
  • [40] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52