On Properties of Policy-Based Specifications

被引:3
|
作者
Margheri, Andrea [1 ,2 ]
Pugliese, Rosario [1 ]
Tiezzi, Francesco [3 ]
机构
[1] Univ Florence, I-50121 Florence, Italy
[2] Univ Pisa, I-56100 Pisa, Italy
[3] Univ Camerino, I-62032 Camerino, Italy
关键词
D O I
10.4204/EPTCS.188.5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems' resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based one permits to capture, by resorting to the concept of attribute, all systems' security-relevant information and to be, at the same time, sufficiently flexible and expressive to represent the other approaches. In this paper, we move a step further to understand the effectiveness of policy-based specifications by studying how they permit to enforce traditional security properties. To support system designers in developing and maintaining policy-based specifications, we formalise also some relevant properties regarding the structure of policies. By means of a case study from the banking domain, we present real instances of such properties and outline an approach towards their automatised verification.
引用
收藏
页码:33 / 50
页数:18
相关论文
共 50 条
  • [31] Formal Policy-Based Provenance Audit
    Butin, Denis
    Demirel, Denise
    Buchmann, Johannes
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 234 - 253
  • [32] A policy-based Mobile Agent infrastructure
    Montanari, R
    Tonti, G
    Stefanelli, C
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET, PROCEEDINGS, 2003, : 370 - 379
  • [33] Policy transformation techniques in policy-based systems management
    Beigi, MS
    Calo, S
    Verma, D
    FIFTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2004, : 13 - 22
  • [34] Distributed policy-based management enabling policy adaptation
    Yoshihara, K
    Isomura, M
    Horiuchi, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (07) : 1854 - 1865
  • [35] Policy-based proactive monitoring of security policy performance
    Bogdanov, Vitaly
    Kotenko, Igor
    COMPUTER NETWORK SECURITY, PROCEEDINGS, 2007, 1 : 197 - +
  • [36] Alternatives to conditionality in policy-based lending
    Morrissey, O
    CONDITIONALITY REVISITED: CONCEPTS, EXPERIENCES, AND LESSONS, 2005, : 237 - 247
  • [37] Policy-based management: A historical perspective
    Boutaba, Raouf
    Aib, Issam
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2007, 15 (04) : 447 - 480
  • [38] A policy-based privacy storage approach
    Nowalczyk, Julien
    Tastet-Cherel, Frederique
    ICEIS 2007: PROCEEDINGS OF THE NINTH INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS: DATABASES AND INFORMATION SYSTEMS INTEGRATION, 2007, : 605 - 608
  • [39] Policy-Based Automated Compliance Checking
    Al Bassit, Anas
    Krasnashchok, Katsiaryna
    Skhiri, Sabri
    Mustapha, Majd
    RULES AND REASONING, RULEML+RR 2021, 2021, 12851 : 3 - 17
  • [40] Policy-Based Instantiation of Norms in MAS
    Urzica, Andreea
    Gratie, Cristian
    INTELLIGENT DISTRIBUTED COMPUTING VI, 2013, 446 : 287 - 296