Security Analysis of Role-Based Access Control through Program Verification

被引:13
|
作者
Ferrara, Anna Lisa [1 ]
Madhusudan, P. [2 ]
Parlato, Gennaro [3 ]
机构
[1] Univ Bristol, Bristol BS8 1TH, Avon, England
[2] Univ Illinois, Urbana, IL USA
[3] Univ Southampton, Southampton, Hants, England
基金
美国国家科学基金会;
关键词
Access control; formal methods for security; SAFETY;
D O I
10.1109/CSF.2012.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction-based tools available for program verification. Our scheme uses a combination of abstraction and reduction to program verification to perform security analysis. We convert ARBAC policies to imperative programs that simulate the policy abstractly, and then utilize further abstract-interpretation techniques from program analysis to analyze the programs in order to prove the policies secure. We argue that the aggressive set-abstractions and numerical-abstractions we use are natural and appropriate in the access control setting. We implement our scheme using a tool called VAC that translates ARBAC policies to imperative programs followed by an interval-based static analysis of the program, and show that we can effectively prove access control policies correct. The salient feature of our approach are the abstraction schemes we develop and the reduction of role-based access control security (which has nothing to do with programs) to program verification problems.
引用
收藏
页码:113 / 125
页数:13
相关论文
共 50 条
  • [1] Security analysis in role-based access control
    Purdue University, West Lafayette, IN, United States
    不详
    不详
    不详
    [J]. ACM Trans. Inf. Syst. Secur., 2006, 4 (391-420):
  • [2] Modelling and Verification of Dynamic Role-Based Access Control
    Vistbakka, Inna
    Troubitsyna, Elena
    [J]. VERIFICATION AND EVALUATION OF COMPUTER AND COMMUNICATION SYSTEMS, 2018, 11181 : 48 - 63
  • [3] A role-based multilevel security access control model
    Pan, L
    Zhang, CN
    Yang, CG
    [J]. JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2006, 46 (03) : 1 - 10
  • [4] Enhanced Role-Based Access Control for Cloud Security
    Balamurugan, B.
    Krishna, P. Venkata
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 837 - 852
  • [5] Role-based web security access control system
    Gui, Yan-Feng
    Lin, Zuo-Quan
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2003, 40 (08):
  • [6] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255
  • [7] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [8] Automated Verification of Role-based Access Control Security Models Recovered from Dynamic Web Applications
    Alalfi, Manar H.
    Cordy, James R.
    Dean, Thomas R.
    [J]. 2012 14TH IEEE INTERNATIONAL SYMPOSIUM ON WEB SYSTEMS EVOLUTION (WSE), 2012, : 1 - 10
  • [9] Role-based access control
    [J]. Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2000, 21 (02): : 198 - 200
  • [10] Early Validation and Verification of a Distributed Role-Based Access Control Model
    Zafar, Saad
    Colvin, Robert
    Winter, Kirsten
    Yatapanage, Nisansala
    Dromey, R. G.
    [J]. 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 430 - +