On Properties of Policy-Based Specifications

نویسندگان

  • Andrea Margheri
  • Rosario Pugliese
  • Francesco Tiezzi
چکیده

The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems’ resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based one permits to capture, by resorting to the concept of attribute, all systems’ security-relevant information and to be, at the same time, sufficiently flexible and expressive to represent the other approaches. In this paper, we move a step further to understand the effectiveness of policy-based specifications by studying how they permit to enforce traditional security properties. To support system designers in developing and maintaining policy-based specifications, we formalise also some relevant properties regarding the structure of policies. By means of a case study from the banking domain, we present real instances of such properties and outline an approach towards their automatised verification.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toughness Performance of Recycled Aggregates for use in Road Pavement

The policy of driving organization such as Highways Agency is towards the use of performance related specifications. This policy and adoption of European wide aggregate standards on the one hand, and sustainable construction pressures on the other, all strongly emphasize on further need for more developments to specifications and performance assessment methodologies inst...

متن کامل

Comparison of Different Hydraulic Fracture Growth Models Based on a Carbonate Reservoir in Iran

There has been little interest in the application of hydraulic fracture treatment in Iranian oil fields, thanks to the primarily suitable production rates of the vast oil fields. In this paper, hydraulic fracturing treatment was simulated by different models for a carbonate reservoir in the southwest of Iran. Suitable pay zones were nominated based on the lithology, water-oil saturation, geomec...

متن کامل

General Methods for Access Control Policy Verification

Access control systems are among the most critical of computer security components. Faulty policies, misconfigurations, or flaws in software implementations can result in serious vulnerabilities. To formally and precisely capture the security properties that access control should adhere to, access control models are usually written, bridging the gap in abstraction between policies and mechanism...

متن کامل

Verifiable Policy-Based Routing With DRIVER

The Internet today runs on a complex routing protocol called the Border Gateway Protocol (BGP). BGP is a policy-based protocol, in which autonomous Internet Service Providers (ISPs) impose their local policies on the propagation of routing information. Over the past few years, there has been a growing consensus on the complexity and fragility of BGP routing. To address these challenges, we pres...

متن کامل

Formal Security Policy Verification of Distributed Component-Structured Software

Component-structured software, which is coupled from independently developed software components, introduces new security problems. In particular, a component may attack components of its environment and, in consequence, spoil the application incorporating it. Therefore, to guard a system, we constrain the behavior of a component by ruling out the transmission of events between components which...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015