Access Control is becoming increasingly important for today ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designers and administrators with automated analysis techniques that are capable to foresee if, and under what conditions, security properties may be violated. In this paper, we consider this analysis problem in the context of the Role-Based Access Control (RBAC), one of the most widespread access control models. We describe how we design heuristics to enable an analysis tool, called asaspXL, to scale up to handle large and complex Administrative RBAC policies. We also discuss the capability of applying the techniques inside the tool to the analysis of location-based privacy policies. An extensive experimentation shows that the proposed heuristics play a key role in the success of the analysis tool over the state-of-the-art analysis tools.

Scalable automated analysis of access control and privacy policies / Truong, A.; Ranise, S.; Nguyen, T. T.. - 10720:(2017), pp. 142-171. (Intervento presentato al convegno 3rd International Conference on Future Data and Security Engineering, FDSE 2016 and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016 tenutosi a vnm nel 2016) [10.1007/978-3-662-56266-6_7].

Scalable automated analysis of access control and privacy policies

Ranise S.;
2017-01-01

Abstract

Access Control is becoming increasingly important for today ubiquitous systems. Sophisticated security requirements need to be ensured by authorization policies for increasingly complex and large applications. As a consequence, designers need to understand such policies and ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimensions of the authorization policies. It is thus necessary to provide policy designers and administrators with automated analysis techniques that are capable to foresee if, and under what conditions, security properties may be violated. In this paper, we consider this analysis problem in the context of the Role-Based Access Control (RBAC), one of the most widespread access control models. We describe how we design heuristics to enable an analysis tool, called asaspXL, to scale up to handle large and complex Administrative RBAC policies. We also discuss the capability of applying the techniques inside the tool to the analysis of location-based privacy policies. An extensive experimentation shows that the proposed heuristics play a key role in the success of the analysis tool over the state-of-the-art analysis tools.
2017
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
HEIDELBERGER PLATZ 3, D-14197 BERLIN, GERMANY
Springer Verlag
978-3-662-56265-9
978-3-662-56266-6
Truong, A.; Ranise, S.; Nguyen, T. T.
Scalable automated analysis of access control and privacy policies / Truong, A.; Ranise, S.; Nguyen, T. T.. - 10720:(2017), pp. 142-171. (Intervento presentato al convegno 3rd International Conference on Future Data and Security Engineering, FDSE 2016 and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016 tenutosi a vnm nel 2016) [10.1007/978-3-662-56266-6_7].
File in questo prodotto:
Non ci sono file associati a questo prodotto.

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11572/333338
 Attenzione

Attenzione! I dati visualizzati non sono stati sottoposti a validazione da parte dell'ateneo

Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 0
  • ???jsp.display-item.citation.isi??? 0
social impact