Analysis of XACML policies with SMT

被引:26
|
作者
Turkmen, Fatih [1 ]
Den Hartog, Jerry [1 ]
Ranise, Silvio [2 ]
Zannone, Nicola [1 ]
机构
[1] Eindhoven University of Technology, Eindhoven, Netherlands
[2] Fondazione Bruno Kessler (FBK), Trento, Italy
关键词
XML;
D O I
10.1007/978-3-662-46666-7_7
中图分类号
学科分类号
摘要
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for the specification of access control policies. However, the richness and flexibility of the language (along with the verbose syntax of XML) come with a price: errors are easy to make and difficult to detect when policies grow in size. If these errors are not detected and rectified, they can result in serious data leakage and/or privacy violations leading to significant legal and financial consequences. To assist policy authors in the analysis of their policies, several policy analysis tools have been proposed based on different underlying formalisms. However, most of these tools either abstract away functions over non-Boolean domains (hence they cannot provide information about them) or produce very large encodings which hinder the performance. In this paper, we present a generic policy analysis framework that employs SMT as the underlying reasoning mechanism. The use of SMT does not only allow more fine-grained analysis of policies but also improves the performance. We demonstrate that a wide range of security properties proposed in the literature can be easily modeled within the framework. A prototype implementation and its evaluation are also provided. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:115 / 134
相关论文
共 50 条
  • [1] Formal analysis of XACML policies using SMT
    Turkmen, Fatih
    den Hartog, Jerry
    Ranise, Silvio
    Zannone, Nicola
    COMPUTERS & SECURITY, 2017, 66 : 185 - 203
  • [2] Analysis of XACML Policies with ASP
    Ayed, Dhouha
    Lepareux, Marie-Noelle
    Martins, Cyrille
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [3] On the Use of SMT Solving for XACML Policy Evaluation
    Turkmen, Fatih
    Demchenko, Yuri
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 539 - 544
  • [4] ANALYSIS AND VERIFICATION OF XACML POLICIES IN A MEDICAL CLOUD ENVIRONMENT
    Ayache, Meryeme
    Erradi, Mohammed
    Khoumsi, Ahmed
    Freisleben, Bernd
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2016, 17 (03): : 189 - 205
  • [5] Challenges of Composing XACML Policies
    Stepien, Bernard
    Felty, Amy
    Matwin, Stan
    2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 234 - 241
  • [6] Evaluating Distributed XACML Policies
    Dhankhar, Vijayant
    Kaushik, Saket
    Wijesekera, Duminda
    Nerode, Anil
    SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 99 - 110
  • [7] Towards Efficient Evaluation of XACML Policies
    Mourad, Azzam
    Jebbaoui, Hussein
    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 164 - 171
  • [8] WiP: Enhancing the Comprehension of XACML Policies
    Mehri, Gelareh Hasel
    Le, Tien Dung
    Cappers, Bram
    den Hartog, Jerry
    Zannone, Nicola
    PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 41 - 46
  • [9] XACML policies for exclusive resource usage
    Dhankhar, Vijayant
    Kaushik, Saket
    Wijesekera, Duminda
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 275 - +
  • [10] A Toolchain for Designing and Testing XACML Policies
    Bertolino, Antonia
    Busch, Marianne
    Daoudagh, Said
    Koch, Nora
    Lonetti, Francesca
    Marchetti, Eda
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2013), 2013, : 495 - +