Analysis of XACML policies with SMT

被引:26
|
作者
Turkmen, Fatih [1 ]
Den Hartog, Jerry [1 ]
Ranise, Silvio [2 ]
Zannone, Nicola [1 ]
机构
[1] Eindhoven University of Technology, Eindhoven, Netherlands
[2] Fondazione Bruno Kessler (FBK), Trento, Italy
关键词
XML;
D O I
10.1007/978-3-662-46666-7_7
中图分类号
学科分类号
摘要
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for the specification of access control policies. However, the richness and flexibility of the language (along with the verbose syntax of XML) come with a price: errors are easy to make and difficult to detect when policies grow in size. If these errors are not detected and rectified, they can result in serious data leakage and/or privacy violations leading to significant legal and financial consequences. To assist policy authors in the analysis of their policies, several policy analysis tools have been proposed based on different underlying formalisms. However, most of these tools either abstract away functions over non-Boolean domains (hence they cannot provide information about them) or produce very large encodings which hinder the performance. In this paper, we present a generic policy analysis framework that employs SMT as the underlying reasoning mechanism. The use of SMT does not only allow more fine-grained analysis of policies but also improves the performance. We demonstrate that a wide range of security properties proposed in the literature can be easily modeled within the framework. A prototype implementation and its evaluation are also provided. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:115 / 134
相关论文
共 50 条
  • [31] A conflict detection approach for XACML policies on hierarchical resources
    Xia, Xiaofeng
    2012 IEEE INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND COMMUNICATIONS, CONFERENCE ON INTERNET OF THINGS, AND CONFERENCE ON CYBER, PHYSICAL AND SOCIAL COMPUTING (GREENCOM 2012), 2012, : 755 - 760
  • [32] Extending XACML to Express and Enforce Laws and Regulations Privacy Policies
    Alshugran, Tariq
    Dichter, Julius
    Rusu, Amalia
    2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2015,
  • [33] XACSim: a new tool for measuring similarity of XACML security policies
    Katebi, Zahra
    Nassiri, Mohammad
    Rezvani, Mohsen
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (06): : 3957 - 3972
  • [34] Coverage-based Test Cases Selection for XACML Policies
    Bertolino, Antonia
    Le Traon, Yves
    Lonetti, Francesca
    Marchetti, Eda
    Mouelhi, Tejeddine
    2014 SEVENTH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION WORKSHOPS (ICSTW 2014), 2014, : 12 - 21
  • [35] A Formal Approach to Automatic Testing of Security Policies Specified in XACML
    Aouadi, Mohamed H. E.
    Toumi, Khalifa
    Cavalli, Ana
    FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014), 2015, 8930 : 367 - 374
  • [36] XACSim: a new tool for measuring similarity of XACML security policies
    Zahra Katebi
    Mohammad Nassiri
    Mohsen Rezvani
    Cluster Computing, 2023, 26 : 3957 - 3972
  • [37] Formal engineering of XACML access control policies in VDM++
    Bryans, Jeremy W.
    Fitzgerald, John S.
    FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2007, 4789 : 37 - 56
  • [38] Composing administrative scope of delegation policies based on extended XACML
    Feng, Li Xiao
    Guo, Feng Deng
    10TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2006, : 467 - 470
  • [39] Adaptive XACML access policies for heterogeneous distributed IoT environments
    Riad, Khaled
    Cheng, Jieren
    INFORMATION SCIENCES, 2021, 548 : 135 - 152
  • [40] Detecting Incorrect Uses of Combining Algorithms in XACML 3.0 Policies
    Xu, Dianxiang
    Shen, Ning
    Zhang, Yunpeng
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2015, 25 (9-10) : 1551 - 1571