Security Policy Languages and Enforcement

نویسندگان

  • Scott D. Stoller
  • Yanhong A. Liu
چکیده

As organizations grow larger and more complex, and as cybersecurity becomes an increasingly important concern, there are growing needs for languages that can express complex security policies of organizations and for efficient mechanisms to enforce the policies. An essential function of security policies is to control authorization, that is, to determine whether a request to access a resource should be permitted or denied. This paper considers two key aspects of security policy languages—support for decentralized policy administration through “trust management”, and support for scalable policy management through roles—and techniques for the efficient implementation of these languages. The implementation techniques provide a basis for enforcing security policies expressed in these languages. Traditional ways of expressing authorization policies, such as access control lists, were developed to support authorization in centralized systems with a single administrator in control of all aspects of security policy for the entire system. They are generally adequate and widely used in that context, but they have serious deficiencies for enterprise-wide applications [2], which may have many administrative domains and varying trust relationships. Trust management systems are designed to support authorization in distributed systems [2]. The defining characteristic of trust management systems is support for decentralized security policy administration through delegation: an entity can authorize another entity to control specified aspects of security policy. For example, a company’s chief executive officer (CEO) might allow each manager to control his subordinates’ access to technical data, while the CEO retains complete control over everyone’s access to the company’s strategic plan. Role-based policy languages support scalable specification and management of policies in large systems [11, 4]. A role is an abstraction that represents a set of permissions, typically the permissions needed to perform the tasks associated with a position in an organization. Role-based authorization policies specify the roles that each user may adopt, and the permissions associated with each role.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Policy Enforcement in the Antigone System

Works in communication security policy have recently focused on general-purpose policy languages and evaluation algorithms. However, because the supporting frameworks often defer enforcement, the correctness of a realization of these policies in software is limited by the quality of domain-specific implementations. This paper introduces the Antigone communication security policy enforcement fra...

متن کامل

Security and Privacy Policy Languages: A Survey, Categorization and Gap Identification

For security and privacy management and enforcement purposes, various policy languages have been presented. We give an overview on 27 security and privacy policy languages and present a categorization framework for policy languages. We show how the current policy languages are represented in the framework and summarize our interpretation. We show up identified gaps and motivate for the adoption...

متن کامل

Firewall Policy Modeling, Analysis and Simulation: a Survey

Computer firewalls are widely used for security policy enforcement and access control. Current firewalls use various processing models and are configured using their own policy description languages. In this paper we will try to survey research efforts in the area of formalization of firwall operational sematnics and policy description languages and applications of such formal models and langua...

متن کامل

A Declarative Approach for Easy Specification and Automated Enforcement of Security Policy

A security policy presents a critical component of the overall security architecture and an essential basis on which an effective and comprehensive security program can be developed. Although, this necessity and this criticality, little progress has been made to improve tools of specification and enforcement of security policy. Too often, existent approaches have been restrictive in many ways. ...

متن کامل

An interoperability framework for security policy languages

Security policies are widely used across the IT industry in order to secure environments. Firewalls, routers, enterprise application or even operating systems like Windows and Unix are all using security policies to some extent in order to secure certain components. In order to automate enforcement of security policies, security policy languages have been introduced. Security policy languages t...

متن کامل

Static Enforcement of Role-Based Access Control on Method Invocation

We propose a new static approach to RBAC policy enforcement. The static approach we advocate includes a new design methodology, for applications involving RBAC, which integrates the security requirements into the system’s architecture, helping to ensure that policies are correctly defined and enforced. We apply this new approach to policies restricting calls to methods in Java applications. How...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004