The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

被引:50
|
作者
Ferraiolo, David [2 ]
Atluri, Vijayalakshmi [1 ,2 ,3 ]
Gavrila, Serban [2 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[2] NIST, Gaithersburg, MD 20899 USA
[3] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
关键词
Security policy enforcement framework; Policy Machine; Access control;
D O I
10.1016/j.sysarc.2010.04.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practitioners and policy makers have specified a large variety of access control policies to address real-world security issues, only a relatively small subset of these policies can be enforced through off-the-shelf technology, and even a smaller subset can be enforced by any one mechanism. In this paper, we propose an access control framework, referred to as the Policy Machine (PM) that fundamentally changes the way policy is expressed and enforced. Employing PM helps in building high assurance enforcement mechanisms in three respects. First, only a relatively small piece of the overall access control mechanism needs to be included in the host system (e.g., an operating system or application). This significantly reduces the amount of code that needs to be trusted. Second, it is possible to enforce the precise policies of resource owners, without compromise on enforcement or resorting to less effective administrative procedures. Third, the PM is capable of generically imposing confinement constraints that can be used to prevent leakage of information to unauthorized principals within the context of a variety of policies to include the commonly implemented Discretionary Access Control and Role-Based Access Control models. Published by Elsevier B.V.
引用
收藏
页码:412 / 424
页数:13
相关论文
共 50 条
  • [31] Specification and enforcement of flexible security policy for active cooperation
    Sun, Yuqing
    Gong, Bin
    Meng, Xiangxu
    Lin, Zongkai
    Bertino, Elisa
    INFORMATION SCIENCES, 2009, 179 (15) : 2629 - 2642
  • [32] A Comparative Analysis of Linux Mandatory Access Control Policy Enforcement Mechanisms
    Brimhall, Brennon
    Garrard, Justin
    De La Garza, Christopher
    Coffman, Joel
    PROCEEDINGS OF THE 2023 EUROPEAN WORKSHOP ON SYSTEM SECURITY, EUROSEC 2023, 2023, : 1 - 7
  • [33] Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud
    Fugkeaw, Somchart
    Sato, Hiroyuki
    PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 576 - 583
  • [34] xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
    Gheorghe, Gabriela
    Neuhaus, Stephan
    Crispo, Bruno
    TRUST MANAGEMENT IV, 2010, 321 : 63 - 78
  • [35] Policy Architecture for Credential Based Access Control in Open Access Environment
    Dagdee, Nirmal
    Vijaywargiya, Ruchi
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (01): : 39 - 47
  • [36] Research on Multicloud Access Control Policy Integration Framework
    Peng Zhao
    Lifa Wu
    Zheng Hong
    He Sun
    中国通信, 2019, 16 (09) : 222 - 234
  • [37] Formal specification of common criteria based access control policy model
    Singh, Manpreet
    Patterh, Manjeet S.
    International Journal of Network Security, 2010, 11 (03) : 139 - 148
  • [38] Requirements-based Access Control Analysis and Policy Specification (ReCAPS)
    He, Qingfeng
    Anton, Annie I.
    INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (06) : 993 - 1009
  • [39] Research on Multicloud Access Control Policy Integration Framework
    Zhao, Peng
    Wu, Lifa
    Hong, Zheng
    Sun, He
    CHINA COMMUNICATIONS, 2019, 16 (09) : 222 - 234
  • [40] A Virtual Machine Based Information Flow Control System for Policy Enforcement
    Naira, Srijith K.
    Simpson, Patrick N. D.
    Crispo, Bruno
    Tanenbaum, Andrew S.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (01) : 3 - 16