The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

被引:50
|
作者
Ferraiolo, David [2 ]
Atluri, Vijayalakshmi [1 ,2 ,3 ]
Gavrila, Serban [2 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[2] NIST, Gaithersburg, MD 20899 USA
[3] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
关键词
Security policy enforcement framework; Policy Machine; Access control;
D O I
10.1016/j.sysarc.2010.04.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practitioners and policy makers have specified a large variety of access control policies to address real-world security issues, only a relatively small subset of these policies can be enforced through off-the-shelf technology, and even a smaller subset can be enforced by any one mechanism. In this paper, we propose an access control framework, referred to as the Policy Machine (PM) that fundamentally changes the way policy is expressed and enforced. Employing PM helps in building high assurance enforcement mechanisms in three respects. First, only a relatively small piece of the overall access control mechanism needs to be included in the host system (e.g., an operating system or application). This significantly reduces the amount of code that needs to be trusted. Second, it is possible to enforce the precise policies of resource owners, without compromise on enforcement or resorting to less effective administrative procedures. Third, the PM is capable of generically imposing confinement constraints that can be used to prevent leakage of information to unauthorized principals within the context of a variety of policies to include the commonly implemented Discretionary Access Control and Role-Based Access Control models. Published by Elsevier B.V.
引用
收藏
页码:412 / 424
页数:13
相关论文
共 50 条
  • [1] DC Proposal: Knowledge Based Access Control Policy Specification and Enforcement
    Kirrane, Sabrina
    SEMANTIC WEB - ISWC 2011, PT II, 2011, 7032 : 293 - 300
  • [2] Access Control Metamodel for Policy Specification and Enforcement: From Conception to Formalization
    Kashmar, Nadine
    Adda, Mehdi
    Atieh, Mirna
    Ibrahim, Hussein
    12TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT) / THE 4TH INTERNATIONAL CONFERENCE ON EMERGING DATA AND INDUSTRY 4.0 (EDI40) / AFFILIATED WORKSHOPS, 2021, 184 : 887 - 892
  • [3] A Rigorous Framework for Specification, Analysis and Enforcement of Access Control Policies
    Margheri, Andrea
    Masi, Massimiliano
    Pugliese, Rosario
    Tiezzi, Francesco
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2019, 45 (01) : 2 - 33
  • [4] A Service Execution Control Framework for Policy Enforcement
    Tanaka, Masahiro
    Murakami, Yohei
    Lin, Donghui
    SERVICE-ORIENTED COMPUTING - ICSOC 2010, PROCEEDINGS, 2010, 6470 : 108 - 121
  • [5] GEODAC: A Data Assurance Policy Specification and Enforcement Framework for Outsourced Services
    Li, Jun
    Stephenson, Bryan
    Motahari-Nezhad, Hamid R.
    Singhal, Sharad
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2011, 4 (04) : 340 - 354
  • [6] Using RDF for policy specification and enforcement
    Carminati, B
    Ferrari, E
    Thuraisingham, B
    15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 163 - 167
  • [7] Checking Policy Enforcement in an Access Control Aspect Model
    Song, Eunjee
    France, Robert
    Ray, Indrakshi
    Kim, Hanil
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2008, 11 (05): : 541 - 552
  • [8] Access Control for Database Applications: Beyond Policy Enforcement
    Zhang, Wen
    Panda, Aurojit
    Shenker, Scott
    PROCEEDINGS OF THE 19TH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, HOTOS 2023, 2023, : 223 - 230
  • [9] A policy based framework for access control
    Nabhen, R
    Jamhour, E
    Maziero, C
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2003, 2836 : 47 - 59
  • [10] Access Control Policy Specification Language Based on Metamodel
    Luo Y.
    Shen Q.-N.
    Wu Z.-H.
    Ruan Jian Xue Bao/Journal of Software, 2020, 31 (02): : 439 - 454