The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

被引:50
|
作者
Ferraiolo, David [2 ]
Atluri, Vijayalakshmi [1 ,2 ,3 ]
Gavrila, Serban [2 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[2] NIST, Gaithersburg, MD 20899 USA
[3] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
关键词
Security policy enforcement framework; Policy Machine; Access control;
D O I
10.1016/j.sysarc.2010.04.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practitioners and policy makers have specified a large variety of access control policies to address real-world security issues, only a relatively small subset of these policies can be enforced through off-the-shelf technology, and even a smaller subset can be enforced by any one mechanism. In this paper, we propose an access control framework, referred to as the Policy Machine (PM) that fundamentally changes the way policy is expressed and enforced. Employing PM helps in building high assurance enforcement mechanisms in three respects. First, only a relatively small piece of the overall access control mechanism needs to be included in the host system (e.g., an operating system or application). This significantly reduces the amount of code that needs to be trusted. Second, it is possible to enforce the precise policies of resource owners, without compromise on enforcement or resorting to less effective administrative procedures. Third, the PM is capable of generically imposing confinement constraints that can be used to prevent leakage of information to unauthorized principals within the context of a variety of policies to include the commonly implemented Discretionary Access Control and Role-Based Access Control models. Published by Elsevier B.V.
引用
收藏
页码:412 / 424
页数:13
相关论文
共 50 条
  • [21] An adaptive access control policy management framework
    Tout, H
    ISWS '05: Proceedings of the 2005 International Symposium on Web Services and Applications, 2005, : 10 - 15
  • [22] Attribute-based access control policy specification language
    Ye, Chunxiao
    Zhong, Jiang
    Feng, Yong
    Journal of Southeast University (English Edition), 2008, 24 (03) : 260 - 263
  • [23] How to leverage access control specification for autonomic policy management
    Vatsavai, RR
    Chakravarthy, S
    Mohania, M
    ICAC 2005: Second International Conference on Autonomic Computing, Proceedings, 2005, : 358 - 359
  • [24] A flexible architecture for security policy enforcement
    McDaniel, P
    Prakash, A
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 234 - 239
  • [25] Access policy specification for SCADA networks
    Chandía, Rodrigo
    Papa, Mauricio
    World Academy of Science, Engineering and Technology, 2010, 66 : 1002 - 1011
  • [26] Access policy specification for Web applications
    Barker, S
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, PROCEEDINGS, 2004, : 45 - 49
  • [27] Policy specification and enforcement for smart ID cards deployment
    Chandramouli, Ramaswamy
    2008 IEEE WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2008, : 127 - 134
  • [28] A policy-based approach for QoS specification and enforcement in distributed service-oriented architecture
    Wang, CZ
    Wang, GJ
    Chen, A
    Wang, HQ
    Pierce, Y
    Fung, C
    Uczekaj, S
    2005 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, VOL 1, PROCEEDINGS, 2005, : 307 - 310
  • [29] Specification and enforcement of personalized privacy policy for social network
    Wang, Y., 1600, Editorial Board of Journal on Communications (33):
  • [30] Simulation verification and validation by dynamic policy specification and enforcement
    Tsai, W. T.
    Chen, Yinong
    Paul, Ray
    Zhou, Xinyu
    Fan, Chun
    SIMULATION-TRANSACTIONS OF THE SOCIETY FOR MODELING AND SIMULATION INTERNATIONAL, 2006, 82 (05): : 295 - 310