A framework for security assurance of access control enforcement code

被引:8
|
作者
Pavlich-Mariscal, Jaime A. [1 ]
Demurjian, Steven A. [2 ]
Michel, Laurent D. [2 ]
机构
[1] Univ Catolica Norte, Dept Ingn Sistemas & Computac, Angamos 0610, Antofagasta, Chile
[2] Univ Connecticut, Dept Comp Sci & Engn, Unit 2155, Storrs, CT 06269 USA
关键词
Security assurance; Access control; Formal methods; UML;
D O I
10.1016/j.cose.2010.03.004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modeling of access control policies, along with their implementation in code, must be an integral part of the software development process, to ensure that the proper level of security in an application is attained. Previous work of the authors in this area yielded a framework that incorporates access control at the design and code levels, through a set of new extensions to UML and a set of approaches to enfoce access control in an application (Pavlich-Mariscal et al., 2010). An essential property of the code that has not been addressed by that framework is security assurance, which, in the context of this research, is to insure that the application code behaves consistently with the access control policy. This paper proposes a security assurance mechanism that formalizes the application behavior using labeled transition systems and structural operational semantics (Plotkin, 1981). Simulation relations (Milner, 1971) are used to demonstrate the correctness of the access control code with respect to the design. To validate the approach, this paper proves correctness of two access control enforcement mechanisms that are part of our case study: a basic approach to implement access control in code and an aspect-oriented approach. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:770 / 784
页数:15
相关论文
共 50 条
  • [1] A Framework of Composable Access Control Definition, Enforcement and Assurance.
    Pavlich-Mariscal, Jaime A.
    Demurjian, Steven A.
    Michel, Laurent D.
    [J]. SCCC 2008: INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY, PROCEEDINGS, 2008, : 13 - +
  • [2] A framework for composable security definition, assurance, and enforcement
    Pavlich-Mariscal, JA
    Demurjian, SA
    Michel, LD
    [J]. SATELLITE EVENTS AT THE MODELS 2005 CONFERENCE, 2006, 3844 : 353 - 354
  • [3] An extended Proof-Carrying Code framework for security enforcement
    Pirzadeh, Heidar
    Dubé, Danny
    Hamou-Lhadj, Abdelwahab
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6480 (PART 2): : 249 - 269
  • [4] Aclamate: An AOSD security framework for access control
    Prunicki, Andrew
    Elrad, Tzilla
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 293 - +
  • [5] A flexible framework for architecting XML access control enforcement mechanisms
    Luo, B
    Lee, D
    Lee, WC
    Liu, P
    [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2004, 3178 : 133 - 147
  • [6] A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies
    Margheri, Andrea
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (01) : 2 - 33
  • [7] CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs
    Saremi, Fatemeh
    Mashayekhi, Hoda
    Movaghar, Ali
    Jalili, Rasool
    [J]. ADVANCES IN COMPUTER SCIENCE AND ENGINEERING, 2008, 6 : 427 - 434
  • [8] A Security Framework for Service Overlay Networks: Access Control
    Kurian, Jinu
    Sarac, Kamil
    [J]. 2008 5TH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS AND SYSTEMS (BROADNETS 2008), 2008, : 412 - 419
  • [9] A new grid security framework with dynamic access control
    Xie, B
    Gui, XL
    Li, YN
    Qian, DP
    [J]. GRID AND COOPERATIVE COMPUTING GCC 2004, PROCEEDINGS, 2004, 3251 : 863 - 866
  • [10] Safety and security assurance - an integrated framework
    Hessami, A. G.
    [J]. Safety and Reliability for Managing Risk, Vols 1-3, 2006, : 2617 - 2622