Toward Formal Verification of Role-Based Access Control Policies

被引:71
|
作者
Jha, Somesh [1 ]
Li, Ninghui [2 ]
Tripunitara, Mahesh [3 ]
Wang, Qihua [2 ]
Winsborough, William H. [4 ]
机构
[1] Univ Wisconsin, Dept Comp Sci, Madison, WI 53706 USA
[2] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[3] Motorola Labs, Secur & Privacy Technol Lab, Schaumburg, IL 60196 USA
[4] Univ Texas San Antonio, Dept Comp Sci, San Antonio, TX 78205 USA
关键词
Access control; RBAC; formal methods; computational complexity;
D O I
10.1109/TDSC.2007.70225
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Specifying and managing access control policies is a challenging problem. We propose to develop formal verification techniques for access control policies to improve the current state of the art of policy specification and management. In this paper, we formalize classes of security analysis problems in the context of Role-Based Access Control. We show that in general, these problems are PSPACE-complete. We also study the factors that contribute to the computational complexity by considering a lattice of various subcases of the problem with different restrictions. We show that several subcases remain PSPACE-complete and several further restricted subcases are NP-complete, and we identify two subcases that are solvable in polynomial time. We also discuss our experiences and findings from experimentations that use existing formal method tools such as model checking and logic programming for addressing these problems.
引用
收藏
页码:242 / 255
页数:14
相关论文
共 50 条
  • [1] A formal model for role-based access control with constraints
    Giuri, L
    Iglio, P
    [J]. 9TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 1996, : 136 - 145
  • [2] A formal model for parameterized role-based access control
    Abdallah, AE
    Khayat, EJ
    [J]. FORMAL ASPECTS IN SECURITY AND TRUST, 2005, 173 : 233 - 246
  • [3] Modelling and Verification of Dynamic Role-Based Access Control
    Vistbakka, Inna
    Troubitsyna, Elena
    [J]. VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 48 - 63
  • [4] Analyzing and managing role-based access control policies
    Sohr, Karsten
    Drouineaud, Michael
    Ahn, Gail-Joon
    Gogolla, Martin
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (07) : 924 - 939
  • [5] A formal role-based access control model for security policies in multi-domain mobile networks
    Unal, D.
    Caglayan, M. U.
    [J]. COMPUTER NETWORKS, 2013, 57 (01) : 330 - 350
  • [6] VAC - Verifier of Administrative Role-Based Access Control Policies
    Ferrara, Anna Lisa
    Madhusudan, P.
    Nguyen, Truc L.
    Parlato, Gennaro
    [J]. COMPUTER AIDED VERIFICATION, CAV 2014, 2014, 8559 : 184 - 191
  • [7] A comprehensive modeling framework for role-based access control policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 110 - 126
  • [8] Parameterized Role-Based Access Control Policies for XML Documents
    Mueldner, Tomasz
    Leighton, Gregory
    Miziolek, Jan Krzysztof
    [J]. INFORMATION SECURITY JOURNAL, 2009, 18 (06): : 282 - 296
  • [9] Designing role-based access control using formal concept analysis
    Kumar, Ch. Aswani
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (03) : 373 - 383
  • [10] Meta objects for access control: A formal model for role-based principals
    Riechmann, T
    Hauck, FJ
    [J]. NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 30 - 38