The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

被引:50
|
作者
Ferraiolo, David [2 ]
Atluri, Vijayalakshmi [1 ,2 ,3 ]
Gavrila, Serban [2 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[2] NIST, Gaithersburg, MD 20899 USA
[3] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
关键词
Security policy enforcement framework; Policy Machine; Access control;
D O I
10.1016/j.sysarc.2010.04.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practitioners and policy makers have specified a large variety of access control policies to address real-world security issues, only a relatively small subset of these policies can be enforced through off-the-shelf technology, and even a smaller subset can be enforced by any one mechanism. In this paper, we propose an access control framework, referred to as the Policy Machine (PM) that fundamentally changes the way policy is expressed and enforced. Employing PM helps in building high assurance enforcement mechanisms in three respects. First, only a relatively small piece of the overall access control mechanism needs to be included in the host system (e.g., an operating system or application). This significantly reduces the amount of code that needs to be trusted. Second, it is possible to enforce the precise policies of resource owners, without compromise on enforcement or resorting to less effective administrative procedures. Third, the PM is capable of generically imposing confinement constraints that can be used to prevent leakage of information to unauthorized principals within the context of a variety of policies to include the commonly implemented Discretionary Access Control and Role-Based Access Control models. Published by Elsevier B.V.
引用
收藏
页码:412 / 424
页数:13
相关论文
共 50 条
  • [11] Access control policy combinations for the grid using the policy machine
    Hu, Vincent C.
    Ferraiolo, David F.
    Scarfone, Karen
    CCGRID 2007: SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, 2007, : 225 - +
  • [12] A policy enforcement framework for verification and control of service collaboration
    Tsai, W. T.
    Zhou, Xinyu
    Wei, Xiao
    INFORMATION SYSTEMS AND E-BUSINESS MANAGEMENT, 2008, 6 (01) : 83 - 107
  • [13] A policy enforcement framework for verification and control of service collaboration
    W. T. Tsai
    Xinyu Zhou
    Xiao Wei
    Information Systems and e-Business Management, 2008, 6 : 83 - 107
  • [14] Flexflow: A flexible flow control policy specification framework
    Chen, SP
    Wijesekera, D
    Jajodia, S
    DATA AND APPLICATIONS SECURITY XVII: STATUS AND PROSPECTS, 2004, 142 : 358 - 371
  • [15] An Attribute-Based Access Control Extension for OpenStack and its Enforcement Utilizing the Policy Machine
    Bhatt, Smriti
    Patwa, Farhan
    Sandhu, Ravi
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), 2016, : 37 - 45
  • [16] Qualitative constraint enforcement in advanced policy specification
    Mileo, Alessandra
    Schaub, Torsten
    SYMBOLIC AND QUANTITATIVE APPROACHES TO REASONING WITH UNCERTAINTY, PROCEEDINGS, 2007, 4724 : 695 - +
  • [17] Access Control Policy Enforcement for Zero-Trust-Networking
    Vanickis, Romans
    Jacob, Paul
    Dehghanzadeh, Sohelia
    Lee, Brian
    2018 29TH IRISH SIGNALS AND SYSTEMS CONFERENCE (ISSC), 2018,
  • [18] Separating access control policy, enforcement, and functionality in extensible systems
    Grimm, R
    Bershad, BN
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2001, 19 (01): : 36 - 70
  • [19] Label-based access control policy enforcement and management
    Zhou, Wei
    Raja, Vinesh H.
    Meinel, Christoph
    Ahmad, Munir
    SNPD 2006: SEVENTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 395 - +
  • [20] Enforcement of Access Control Policy for Mobile Ad Hoc Networks
    Maity, Soumya
    Ghosh, Soumya K.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 47 - 52