Security Analysis of Role-Based Access Control through Program Verification

被引:14
|
作者
Ferrara, Anna Lisa [1 ]
Madhusudan, P. [2 ]
Parlato, Gennaro [3 ]
机构
[1] Univ Bristol, Bristol BS8 1TH, Avon, England
[2] Univ Illinois, Urbana, IL USA
[3] Univ Southampton, Southampton, Hants, England
基金
美国国家科学基金会;
关键词
Access control; formal methods for security; SAFETY;
D O I
10.1109/CSF.2012.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction-based tools available for program verification. Our scheme uses a combination of abstraction and reduction to program verification to perform security analysis. We convert ARBAC policies to imperative programs that simulate the policy abstractly, and then utilize further abstract-interpretation techniques from program analysis to analyze the programs in order to prove the policies secure. We argue that the aggressive set-abstractions and numerical-abstractions we use are natural and appropriate in the access control setting. We implement our scheme using a tool called VAC that translates ARBAC policies to imperative programs followed by an interval-based static analysis of the program, and show that we can effectively prove access control policies correct. The salient feature of our approach are the abstraction schemes we develop and the reduction of role-based access control security (which has nothing to do with programs) to program verification problems.
引用
收藏
页码:113 / 125
页数:13
相关论文
共 50 条
  • [41] An attributable role-based access control for healthcare
    Schwartmann, D
    COMPUTATIONAL SCIENCE - ICCS 2004, PROCEEDINGS, 2004, 3039 : 1148 - 1155
  • [42] Homonymous role in role-based discretionary access control
    Chu, Xiaowen
    Kai Ouyang
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    Jiang, Yixin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2009, 9 (09): : 1287 - 1300
  • [43] On the homonymous role in role-based discretionary access control
    Ouyang, Kai
    Chu, Xiaowen
    Jiang, Yixin
    Chen, Hsiao-Hwa
    Liu, Jiangchuan
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 313 - +
  • [44] Extending a Role Graph for Role-Based Access Control
    Asakura, Yoshiharu
    Nakamoto, Yukikazu
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (02): : 211 - 219
  • [45] Role-based access control in TOBIAS and NESS
    Marshall, LF
    IEE PROCEEDINGS-SOFTWARE, 2006, 153 (01): : 4 - 6
  • [46] Role-based access control for boxed ambients
    Compagnoni, Adriana
    Gunter, Elsa L.
    Bidinger, Philippe
    THEORETICAL COMPUTER SCIENCE, 2008, 398 (1-3) : 203 - 216
  • [47] Role-based access control consistency validation
    Centonze, Paolina
    Naumovich, Gleb
    Fink, Stephen J.
    Pistoia, Marco
    Proc. Int. Symp. Softw. Test. Anal. ISSTA, (121-131):
  • [48] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [49] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [50] Elements of a language for role-based access control
    Hitchens, M
    Varadharajan, V
    INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 371 - 380