On Properties of Policy-Based Specifications

被引:3
|
作者
Margheri, Andrea [1 ,2 ]
Pugliese, Rosario [1 ]
Tiezzi, Francesco [3 ]
机构
[1] Univ Florence, I-50121 Florence, Italy
[2] Univ Pisa, I-56100 Pisa, Italy
[3] Univ Camerino, I-62032 Camerino, Italy
关键词
D O I
10.4204/EPTCS.188.5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems' resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based one permits to capture, by resorting to the concept of attribute, all systems' security-relevant information and to be, at the same time, sufficiently flexible and expressive to represent the other approaches. In this paper, we move a step further to understand the effectiveness of policy-based specifications by studying how they permit to enforce traditional security properties. To support system designers in developing and maintaining policy-based specifications, we formalise also some relevant properties regarding the structure of policies. By means of a case study from the banking domain, we present real instances of such properties and outline an approach towards their automatised verification.
引用
收藏
页码:33 / 50
页数:18
相关论文
共 50 条
  • [21] Policy-based management for IP networks
    Stevens, ML
    Weiss, WJ
    BELL LABS TECHNICAL JOURNAL, 1999, 4 (04) : 75 - 94
  • [22] Policy-based validation of SAN configuration
    Agrawal, D
    Giles, J
    Lee, KW
    Voruganti, K
    Fijali-Adib, K
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 77 - 86
  • [23] Policy-Based Grooming in Optical Networks
    Verdi, Fabio Luciano
    Carvalho, Claudio
    Magalhaes, Mauricio F.
    Madeira, Edmundo R. M.
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2008, 16 (04) : 325 - 349
  • [24] Poligras: Policy-based Graph Summarization
    Bai, Jiyang
    Zhao, Peixiang
    PROCEEDINGS OF THE VLDB ENDOWMENT, 2024, 17 (10): : 2432 - 2444
  • [25] Policy-Based Authentication for Mobile Agents
    Wang, Yikai
    Mu, Yi
    Zhang, Minjie
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 123 - 137
  • [26] Revocable Policy-Based Chameleon Hash
    Xu, Shengmin
    Ning, Jianting
    Ma, Jinhua
    Xu, Guowen
    Yuan, Jiaming
    Deng, Robert H.
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 327 - 347
  • [27] Policy-based NFV Management and Orchestration
    Makaya, Christian
    Freimuth, Douglas
    Wood, David
    Calo, Seraphin
    2015 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORK (NFV-SDN), 2015, : 128 - 134
  • [28] Policy-based autonomic control service
    Badr, N
    Taleb-Bendiab, A
    Reilly, D
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 99 - 102
  • [29] A policy-based storage management framework
    Devarakonda, M
    Gelb, J
    Saha, A
    Strickland, J
    THIRD INTERNATION WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 232 - 235
  • [30] Policy-Based Grooming in Optical Networks
    Fábio Luciano Verdi
    Cláudio Carvalho
    Maurício F. Magalhães
    Edmundo R. M. Madeira
    Journal of Network and Systems Management, 2008, 16 : 325 - 349