Security Analysis of Role-Based Access Control through Program Verification

被引:13
|
作者
Ferrara, Anna Lisa [1 ]
Madhusudan, P. [2 ]
Parlato, Gennaro [3 ]
机构
[1] Univ Bristol, Bristol BS8 1TH, Avon, England
[2] Univ Illinois, Urbana, IL USA
[3] Univ Southampton, Southampton, Hants, England
基金
美国国家科学基金会;
关键词
Access control; formal methods for security; SAFETY;
D O I
10.1109/CSF.2012.28
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We propose a novel scheme for proving administrative role-based access control (ARBAC) policies correct with respect to security properties using the powerful abstraction-based tools available for program verification. Our scheme uses a combination of abstraction and reduction to program verification to perform security analysis. We convert ARBAC policies to imperative programs that simulate the policy abstractly, and then utilize further abstract-interpretation techniques from program analysis to analyze the programs in order to prove the policies secure. We argue that the aggressive set-abstractions and numerical-abstractions we use are natural and appropriate in the access control setting. We implement our scheme using a tool called VAC that translates ARBAC policies to imperative programs followed by an interval-based static analysis of the program, and show that we can effectively prove access control policies correct. The salient feature of our approach are the abstraction schemes we develop and the reduction of role-based access control security (which has nothing to do with programs) to program verification problems.
引用
收藏
页码:113 / 125
页数:13
相关论文
共 50 条
  • [31] A framework for implementing role-based access control using CORBA security service
    Beznosov, K
    Deng, Y
    [J]. FOURTH ACM WORKSHOP ON ROLE-BASED ACCESS CONTROL, PROCEEDINGS, 1999, : 19 - 30
  • [32] Reasoning about security: A logic and a decision method for role-based access control
    Massacci, F
    [J]. QUALITATIVE AND QUANTITATIVE PRACTICAL REASONING, 1997, 1244 : 421 - 435
  • [33] Research on Security Status Recovery in Temporal Role-Based Access Control System
    Yu Wanjun
    Wang Yong
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, PROCEEDINGS, 2009, : 27 - 29
  • [34] Security enhancement of a flexible payment scheme and its role-based access control
    Chang, Chin-Chen
    Cheng, Yi-Fang
    Lin, Iuon-Chang
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 457 - +
  • [35] Automated and Efficient Analysis of Role-Based Access Control with Attributes
    Armando, Alessandro
    Ranise, Silvio
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVI, 2012, 7371 : 25 - 40
  • [36] Enforcing mobile security with location-aware role-based access control
    Ulltveit-Moe, Nils
    Oleshchuk, Vladimir
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (05) : 429 - 439
  • [37] ACCESS RIGHTS ADMINISTRATION IN ROLE-BASED SECURITY SYSTEMS
    NYANCHAMA, M
    OSBORN, SL
    [J]. DATABASE SECURITY, VIII: STATUS AND PROSPECTS, 1994, 60 : 37 - 56
  • [38] A role-based access control policy verification framework for real-time systems
    Shafiq, B
    Masood, A
    Joshi, J
    Ghafoor, A
    [J]. WORDS 2005: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable, Proceedings, 2005, : 13 - 20
  • [39] Modeling, conflict detection, and verification of a new virtualization role-based access control framework
    Luo, Yang
    Xia, Chunhe
    Lv, Liangshuang
    Wei, Zhao
    Li, Yazhuo
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (10) : 1904 - 1925
  • [40] A Comparative Analysis of Chain-Based Access Control and Role-Based Access Control in the Healthcare Domain
    Omran, Esraa
    Grandison, Tyrone
    Nelson, David
    Bokma, Albert
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2013, 7 (03) : 36 - 52