Analysis of XACML policies with SMT

被引:26
|
作者
Turkmen, Fatih [1 ]
Den Hartog, Jerry [1 ]
Ranise, Silvio [2 ]
Zannone, Nicola [1 ]
机构
[1] Eindhoven University of Technology, Eindhoven, Netherlands
[2] Fondazione Bruno Kessler (FBK), Trento, Italy
关键词
XML;
D O I
10.1007/978-3-662-46666-7_7
中图分类号
学科分类号
摘要
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for the specification of access control policies. However, the richness and flexibility of the language (along with the verbose syntax of XML) come with a price: errors are easy to make and difficult to detect when policies grow in size. If these errors are not detected and rectified, they can result in serious data leakage and/or privacy violations leading to significant legal and financial consequences. To assist policy authors in the analysis of their policies, several policy analysis tools have been proposed based on different underlying formalisms. However, most of these tools either abstract away functions over non-Boolean domains (hence they cannot provide information about them) or produce very large encodings which hinder the performance. In this paper, we present a generic policy analysis framework that employs SMT as the underlying reasoning mechanism. The use of SMT does not only allow more fine-grained analysis of policies but also improves the performance. We demonstrate that a wide range of security properties proposed in the literature can be easily modeled within the framework. A prototype implementation and its evaluation are also provided. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:115 / 134
相关论文
共 50 条
  • [21] Using microsoft office infopath to generate XACML policies
    Sanchez, Manuel
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio E.
    Canovas, Oscar
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 379 - +
  • [22] XACML-Based composition policies for ambient networks
    Kamienski, Carlos
    Fidalgo, Joseane
    Dantas, Ramide
    Sadok, Djamel
    Ohlman, Boerje
    EIGHTH IEEE INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS - PROCEEDINGS, 2007, : 77 - +
  • [23] Analyzing XACML policies using answer set programming
    Mohsen Rezvani
    David Rajaratnam
    Aleksandar Ignjatovic
    Maurice Pagnucco
    Sanjay Jha
    International Journal of Information Security, 2019, 18 : 465 - 479
  • [24] Conformance checking of access control policies specified in XACML
    Hu, Vincent C.
    Martin, Evan
    Hwang, JeeHyun
    Xie, Tao
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 275 - +
  • [25] Modeling XACML Security Policies Using Graph Databases
    Paniagua Diez, Fidel
    Vasu, Amrutha Chikkanayakanahalli
    Suarez Touceda, Diego
    Sierra Camara, Jose Maria
    IT PROFESSIONAL, 2017, 19 (06) : 52 - 57
  • [26] Using Microsoft Office InfoPath to Generate XACML Policies
    Sanchez, Manuel
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio F.
    Canovas, Oscar
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2008, 9 : 134 - +
  • [27] Managing the lifecycle of XACML delegation policies in federated environments
    Sanchez, Manuel
    Canovas, Oscar
    Lopez, Gabriel
    Gomez-Skarmeta, Antonio F.
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 717 - +
  • [28] XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications
    Arshad, Hamed
    Horne, Ross
    Johansen, Christian
    Owe, Olaf
    Willemse, Tim A. C.
    SCIENCE OF COMPUTER PROGRAMMING, 2024, 232
  • [29] Deriving XACML policies from business process models
    Wolter, Christian
    Schaad, Andreas
    Meinel, Christoph
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2007 WORKSHOPS, 2007, 4832 : 142 - +
  • [30] Analyzing XACML policies using answer set programming
    Rezvani, Mohsen
    Rajaratnam, David
    Ignjatovic, Aleksandar
    Pagnucco, Maurice
    Jha, Sanjay
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (04) : 465 - 479