Analysis of XACML policies with SMT

被引:26
|
作者
Turkmen, Fatih [1 ]
Den Hartog, Jerry [1 ]
Ranise, Silvio [2 ]
Zannone, Nicola [1 ]
机构
[1] Eindhoven University of Technology, Eindhoven, Netherlands
[2] Fondazione Bruno Kessler (FBK), Trento, Italy
关键词
XML;
D O I
10.1007/978-3-662-46666-7_7
中图分类号
学科分类号
摘要
The eXtensible Access Control Markup Language (XACML) is an extensible and flexible XML language for the specification of access control policies. However, the richness and flexibility of the language (along with the verbose syntax of XML) come with a price: errors are easy to make and difficult to detect when policies grow in size. If these errors are not detected and rectified, they can result in serious data leakage and/or privacy violations leading to significant legal and financial consequences. To assist policy authors in the analysis of their policies, several policy analysis tools have been proposed based on different underlying formalisms. However, most of these tools either abstract away functions over non-Boolean domains (hence they cannot provide information about them) or produce very large encodings which hinder the performance. In this paper, we present a generic policy analysis framework that employs SMT as the underlying reasoning mechanism. The use of SMT does not only allow more fine-grained analysis of policies but also improves the performance. We demonstrate that a wide range of security properties proposed in the literature can be easily modeled within the framework. A prototype implementation and its evaluation are also provided. © Springer-Verlag Berlin Heidelberg 2015.
引用
收藏
页码:115 / 134
相关论文
共 50 条
  • [41] Enforcing RFID Data Visibility Restrictions Using XACML Security Policies
    Pardal, Miguel L.
    Harrison, Mark
    Sarma, Sanjay
    Marques, Jose Alves
    2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
  • [42] POSTER: Analyzing Access Control Policies with SMT
    Turkmen, Fatih
    den Hartog, Jerry
    Zannone, Nicola
    CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 1508 - 1510
  • [43] An XACML Extension for Business Process-centric Access Control Policies
    Wolter, Christian
    Weiss, Christian
    Meinel, Christoph
    2009 IEEE INTERNATIONAL SYMPOSIUM ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, 2009, : 166 - +
  • [44] XML Access Control: Mapping XACML Policies to Relational Database Tables
    El-Aziz, Abd El-Aziz Ahmed Abd
    Kannanl, Arputharaj
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2014, 11 (06) : 532 - 539
  • [45] A Holistic Approach to Security Policies - Policy Distribution with XACML over COPS
    Peters, Jan
    Rieke, Roland
    Rochaeli, Taufiq
    Steinemann, Bjoern
    Wolf, Ruben
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 168 (SPEC. ISS.) : 143 - 157
  • [46] Managing XACML systems in distributed environments through Meta-Policies
    Diaz-Lopez, Daniel
    Dolera-Tormo, Gines
    Gomez-Marmol, Felix
    Martinez-Perez, Gregorio
    COMPUTERS & SECURITY, 2015, 48 : 92 - 115
  • [47] Formalizing Semantic Differences between Combining Algorithms in XACML 3.0 Policies
    Xu, Dianxiang
    Zhang, Yunpeng
    Shen, Ning
    2015 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (QRS 2015), 2015, : 163 - 172
  • [48] SMT-Based Verification of NGAC Policies
    Duhrovenski, Vladislav
    Chen, Erzhuo
    Xu, Dianxiang
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 860 - 869
  • [49] From model-driven specification to design-level set-based analysis of XACML policies
    Mourad, Azzam
    Tout, Hanine
    Talhi, Chamseddine
    Otrok, Hadi
    Yahyaoui, Hamdi
    COMPUTERS & ELECTRICAL ENGINEERING, 2016, 52 : 65 - 79
  • [50] Semantics-based approach for detecting flaws, conflicts and redundancies in XACML policies
    Jebbaoui, Hussein
    Mourad, Azzam
    Otrok, Hadi
    Haraty, Ramzi
    COMPUTERS & ELECTRICAL ENGINEERING, 2015, 44 : 91 - 103