On Properties of Policy-Based Specifications

被引:3
|
作者
Margheri, Andrea [1 ,2 ]
Pugliese, Rosario [1 ]
Tiezzi, Francesco [3 ]
机构
[1] Univ Florence, I-50121 Florence, Italy
[2] Univ Pisa, I-56100 Pisa, Italy
[3] Univ Camerino, I-62032 Camerino, Italy
关键词
D O I
10.4204/EPTCS.188.5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems' resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based one permits to capture, by resorting to the concept of attribute, all systems' security-relevant information and to be, at the same time, sufficiently flexible and expressive to represent the other approaches. In this paper, we move a step further to understand the effectiveness of policy-based specifications by studying how they permit to enforce traditional security properties. To support system designers in developing and maintaining policy-based specifications, we formalise also some relevant properties regarding the structure of policies. By means of a case study from the banking domain, we present real instances of such properties and outline an approach towards their automatised verification.
引用
收藏
页码:33 / 50
页数:18
相关论文
共 50 条
  • [41] Policy-Based Management for Smart Mobility
    Vazao, Teresa
    Gomes, Joao Duarte
    Chaves, Ricardo
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 278 - 287
  • [42] Prime time for policy-based management
    Cuervo, F
    Jansen, A
    ALCATEL TELECOMMUNICATIONS REVIEW, 2003, (03): : 203 - 208
  • [43] Special issue on policy-based networking
    O'Reilly, P
    IEEE NETWORK, 2002, 16 (02): : 2 - 2
  • [44] POST: POlicy-Based Switch Tracking
    Wang, Ning
    Zhou, Wengang
    Qi, Guojun
    Li, Houqiang
    THIRTY-FOURTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, THE THIRTY-SECOND INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE AND THE TENTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2020, 34 : 12184 - 12191
  • [45] Cauldron: A policy-based design tool
    Ramshaw, Lyle
    Sahai, Akhil
    Saxe, Jim
    Singhal, Sharad
    SEVENTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 113 - +
  • [46] Policy-based service registration and discovery
    Phan, Tan
    Han, Jun
    Schneider, Jean-Guy
    Ebringer, Tim
    Rogers, Tony
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPLS, DOA, ODBASE, GADA, AND IS, PT 1, PROCEEDINGS, 2007, 4803 : 417 - +
  • [47] A defeasible logic of policy-based intention
    Governatori, G
    Padmanabhan, V
    AI 2003: ADVANCES IN ARTIFICIAL INTELLIGENCE, 2003, 2903 : 414 - 426
  • [48] A Policy-based Communications Architecture for Vehicles
    Prevelakis, Vassilis
    Hamad, Mohammad
    2015 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2015, : 155 - 162
  • [49] Modeling of policy-based network with SVDB
    Lee, WY
    Seo, HS
    Cho, TH
    ARTIFICIAL INTELLIGENCE AND SIMULATION, 2004, 3397 : 323 - 332
  • [50] Modeling of policy-based mobile payment
    Kim, SK
    6TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS: BROADBAND CONVERGENCE NETWORK INFRASTRUCTURE, 2004, : 1009 - 1011