The Policy Machine: A novel architecture and framework for access control policy specification and enforcement

被引:50
|
作者
Ferraiolo, David [2 ]
Atluri, Vijayalakshmi [1 ,2 ,3 ]
Gavrila, Serban [2 ]
机构
[1] Rutgers State Univ, MSIS Dept, Newark, NJ 07102 USA
[2] NIST, Gaithersburg, MD 20899 USA
[3] Rutgers State Univ, CIMIC, Newark, NJ 07102 USA
关键词
Security policy enforcement framework; Policy Machine; Access control;
D O I
10.1016/j.sysarc.2010.04.005
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to control access to sensitive data in accordance with policy is perhaps the most fundamental security requirement. Despite over four decades of security research, the limited ability for existing access control mechanisms to generically enforce policy persists. While researchers, practitioners and policy makers have specified a large variety of access control policies to address real-world security issues, only a relatively small subset of these policies can be enforced through off-the-shelf technology, and even a smaller subset can be enforced by any one mechanism. In this paper, we propose an access control framework, referred to as the Policy Machine (PM) that fundamentally changes the way policy is expressed and enforced. Employing PM helps in building high assurance enforcement mechanisms in three respects. First, only a relatively small piece of the overall access control mechanism needs to be included in the host system (e.g., an operating system or application). This significantly reduces the amount of code that needs to be trusted. Second, it is possible to enforce the precise policies of resource owners, without compromise on enforcement or resorting to less effective administrative procedures. Third, the PM is capable of generically imposing confinement constraints that can be used to prevent leakage of information to unauthorized principals within the context of a variety of policies to include the commonly implemented Discretionary Access Control and Role-Based Access Control models. Published by Elsevier B.V.
引用
收藏
页码:412 / 424
页数:13
相关论文
共 50 条
  • [41] A Policy Enforcement Architecture for a Set of Connected Middleboxes
    Ngo, Minh-Tan
    Kim, Younghan
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 790 - 791
  • [42] Specification & Enforcement of Access Control in Information & Communication Systems
    El Kalam, Anas Abou
    2008 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES: FROM THEORY TO APPLICATIONS, VOLS 1-5, 2008, : 2580 - 2585
  • [43] Specification and enforcement of access control in heterogeneous distributed applications
    Fink, T
    Koch, M
    Oancea, C
    WEB SERVICES -ICWS-EUROPE 2003, PROCEEDINGS, 2003, 2853 : 88 - 100
  • [44] Specification of a Policy Based Network Management architecture
    Berto-Monleon, Ricardo
    Casini, Enrico
    van Engelshoven, Rob
    Goode, Rob
    Tuchs, Klaus-Dieter
    Halmai, Tamas
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1393 - 1398
  • [45] The role of an access control policy sandbox in a service oriented architecture
    Tout, H
    Schoenfield, B
    IC'04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTERNET COMPUTING, VOLS 1 AND 2, 2004, : 434 - 439
  • [46] Policy specification and architecture for quality of service management
    Muruganantha, N
    Lutfiyya, H
    INTEGRATED NETWORK MANAGEMENT VIII: MANAGING IT ALL, 2003, 118 : 535 - 548
  • [47] A Metamodel for the Design of Access-Control Policy Enforcement Managers: Work in Progress
    Jiague, Michel Embe
    Frappier, Marc
    Gervais, Frederic
    Laleau, Regine
    St-Denis, Richard
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 218 - +
  • [48] Context-Aware Policy Enforcement for PaaS-Enabled Access Control
    Verginadis, Yiannis
    Patiniotakis, Ioannis
    Gouvas, Panagiotis
    Mantzouratos, Spyros
    Veloudis, Simeon
    Schork, Sebastian Thomas
    Seitzluwig, Ludwig
    Paraskakis, Iraklis
    Mentzas, Gregoris
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (01) : 276 - 291
  • [49] A Declarative Approach for Easy Specification and Automated Enforcement of Security Policy
    Hamdi, Hedi
    Bouhoula, Adel
    Mosbah, Mohamed
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (02): : 60 - 71
  • [50] Policy specification and enforcement for detection of security violations in a mail service
    Murali, A.
    Rao, M.
    ICIT 2006: 9TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2006, : 172 - +