Formal Verification of Liferay RBAC

被引:0
|
作者
Calzavara, Stefano [1 ]
Rabitti, Alvise [1 ]
Bugliesi, Michele [1 ]
机构
[1] Univ Ca Foscari Venezia, Venice, Italy
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Liferay is the leading opensource portal for the enterprise, implementing a role-based access control (RBAC) mechanism for user and content management. Despite its critical importance, however, the access control system implemented in Liferay is poorly documented and lacks automated tools to assist portal administrators in configuring it correctly. To make matters worse, although strongly based on the RBAC model and named around it, the access control mechanism implemented in Liferay has a number of unconventional features, which significantly complicate verification. In this paper we introduce a formal semantics for Liferay RBAC and we propose a verification technique based on abstract model-checking, discussing sufficient conditions for the soundness and the completeness of the analysis. We then present a tool, called LifeRBAC, which implements our theory to verify the security of real Liferay portals. We show that the tool is effective at proving the absence of security flaws, while efficient enough to be of practical use.
引用
收藏
页码:1 / 16
页数:16
相关论文
共 50 条
  • [1] A first step towards formal verification of security policy properties for RBAC
    Drouineaud, M
    Bortin, M
    Torrini, P
    Sohr, K
    QSIC 2004: PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, 2004, : 60 - 67
  • [2] Ambit: Verification of Azure RBAC
    Kupresanin, Matija
    Subotic, Pavle
    PROCEEDINGS OF THE 2023 CLOUD COMPUTING SECURITY WORKSHOP, CCSW 2023, 2023, : 31 - 40
  • [3] A formal proximity model for RBAC systems
    Gupta, Aditi
    Kirkpatrick, Michael S.
    Bertino, Elisa
    COMPUTERS & SECURITY, 2014, 41 : 52 - 67
  • [4] A Formal Proximity Model for RBAC Systems
    Gupta, Aditi
    Kirkpatrick, Michael
    Bertino, Elisa
    PROCEEDINGS OF THE 2012 8TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM 2012), 2012, : 1 - 10
  • [5] Integrating Delegation with the Formal Core RBAC Model
    Abdallah, Ali E.
    Takabi, Hassan
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 33 - 36
  • [6] A Formal Approach for Risk Assessment in RBAC Systems
    Ma, Ji
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (17) : 2432 - 2451
  • [7] A formal comparison of the Bell & LaPadula and RBAC models
    Habib, Lionel
    Jaume, Mathieu
    Morisset, Charles
    FOURTH INTERNATIONAL SYMPOSIUM ON INFORMATION ASSURANCE AND SECURITY, PROCEEDINGS, 2008, : 3 - +
  • [8] Formal Verification
    Meenakshi, B.
    RESONANCE-JOURNAL OF SCIENCE EDUCATION, 2005, 10 (05): : 26 - 38
  • [9] Formal verification
    B Meenakshi
    Resonance, 2005, 10 (5) : 26 - 38
  • [10] A Verification Framework for Temporal RBAC with Role Hierarchy
    Mondal, Samrat
    Sural, Shamik
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2008, 5352 : 140 - 147