Automated verification of access control policies using a SAT solver

被引:66
|
作者
Graham Hughes
Tevfik Bultan
机构
[1] University of California,Computer Science Department
关键词
Access control; Automated verification;
D O I
10.1007/s10009-008-0087-9
中图分类号
学科分类号
摘要
Managing access control policies in modern computer systems can be challenging and error-prone. Combining multiple disparate access policies can introduce unintended consequences. In this paper, we present a formal model for specifying access to resources, a model that encompasses the semantics of the xacml access control language. From this model we define several ordering relations on access control policies that can be used to automatically verify properties of the policies. We present a tool for automatically verifying these properties by translating these ordering relations to Boolean satisfiability problems and then applying a sat solver. Our experimental results demonstrate that automated verification of xacml policies is feasible using this approach.
引用
收藏
页码:503 / 520
页数:17
相关论文
共 50 条
  • [21] Verification of Information Flow and Access Control Policies with Dependent Types
    Nanevski, Aleksandar
    Banerjee, Anindya
    Garg, Deepak
    2011 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2011), 2011, : 165 - 179
  • [22] A comprehensive approach to the automatic refinement and verification of access control policies
    Cherninod, Manuel
    Durante, Luca
    Seno, Lucia
    Valenza, Fulvio
    Valenzano, Adriano
    COMPUTERS & SECURITY, 2019, 80 : 186 - 199
  • [23] On the Construction and Verification of Self-modifying Access Control Policies
    Power, David
    Slaymaker, Mark
    Simpson, Andrew
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2009, 5776 : 107 - 121
  • [24] Assessing Quality of Policy Properties in Verification of Access Control Policies
    Martin, Evan
    Hwang, JeeHyun
    Xie, Tao
    Hu, Vincent
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 163 - +
  • [25] Automated Verification of Linearization Policies
    Abdulla, Parosh Aziz
    Jonsson, Bengt
    Cong Quy Trinh
    STATIC ANALYSIS, (SAS 2016), 2016, 9837 : 61 - 83
  • [26] Formal verification of a modern SAT solver by shallow embedding into Isabelle/HOL
    Maric, Filip
    THEORETICAL COMPUTER SCIENCE, 2010, 411 (50) : 4333 - 4356
  • [27] Automated Analysis of Access Control Policies Based on Model Checking
    Truong A.
    SN Computer Science, 2020, 1 (6)
  • [28] Using a SAT Solver to Generate Checking Sequences
    Jourdan, Guy-Vincent
    Ural, Hasan
    Yeniguen, Huesnue
    Zhu, Dong
    2009 24TH INTERNATIONAL SYMPOSIUM ON COMPUTER AND INFORMATION SCIENCES, 2009, : 547 - +
  • [29] Implementing an action language using a SAT solver
    Nabeshima, H
    Inoue, K
    Haneda, H
    12TH IEEE INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2000, : 96 - 103
  • [30] NoSQL Database Generation Using SAT Solver
    Ibrahim, Muhammad
    Sarwar, Nadeem
    2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 627 - 631