VAC - Verifier of Administrative Role-Based Access Control Policies

被引:0
|
作者
Ferrara, Anna Lisa [1 ]
Madhusudan, P. [2 ]
Nguyen, Truc L. [3 ]
Parlato, Gennaro [3 ]
机构
[1] Univ Bristol, Bristol, Avon, England
[2] Univ Illinois, Champaign, IL 61820 USA
[3] Univ Southampton, Southampton, Hants, England
来源
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we present VAc, an automatic tool for verifying security properties of administrative Role-based Access Control (RBAC). RBAC has become an increasingly popular access control model, particularly suitable for large organizations, and it is implemented in several software. Automatic security analysis of administrative RBAC systems is recognized as an important problem, as an analysis tool can help designers check whether their policies meet expected security properties. VAc converts administrative RBAC policies to imperative programs that simulate the policies both precisely and abstractly and supports several automatic verification back-ends to analyze the resulting programs. In this paper, we describe the architecture of VAc and overview the analysis techniques that have been implemented in the tool. We also report on experiments with several benchmarks from the literature.
引用
收藏
页码:184 / 191
页数:8
相关论文
共 50 条
  • [1] Security Analysis of Administrative Role-Based Access Control Policies with Contextual Information
    Khai Kim Quoc Dinh
    Tuan Duc Tran
    Anh Truong
    [J]. FUTURE DATA AND SECURITY ENGINEERING, 2017, 10646 : 243 - 261
  • [2] Policy analysis for Administrative Role-Based Access Control
    Sasturkar, Amit
    Yang, Ping
    Stoller, Scott D.
    Ramakrishnan, C. R.
    [J]. THEORETICAL COMPUTER SCIENCE, 2011, 412 (44) : 6208 - 6234
  • [3] A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis
    Singh, Mahendra Pratap
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. INFORMATION SYSTEMS FRONTIERS, 2021,
  • [4] Scalable automated symbolic analysis of administrative role-based access control policies by SMT solving
    Armando, Alessandro
    Ranise, Silvio
    [J]. JOURNAL OF COMPUTER SECURITY, 2012, 20 (04) : 309 - 352
  • [5] Analyzing and managing role-based access control policies
    Sohr, Karsten
    Drouineaud, Michael
    Ahn, Gail-Joon
    Gogolla, Martin
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (07) : 924 - 939
  • [6] Planning User Assignment in Administrative Role-Based Access Control
    Huang, Wei
    Yang, Yang
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 615 - +
  • [7] AMTRAC: An administrative model for temporal role-based access control
    Sharma, Manisha
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. COMPUTERS & SECURITY, 2013, 39 : 201 - 218
  • [8] Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies
    Shahen, Jonathan
    Niu, Jianwei
    Tripunitara, Mahesh, V
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2349 - 2364
  • [9] A comprehensive modeling framework for role-based access control policies
    Ben Fadhel, Ameni
    Bianculli, Domenico
    Briand, Lionel
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2015, 107 : 110 - 126
  • [10] Toward Formal Verification of Role-Based Access Control Policies
    Jha, Somesh
    Li, Ninghui
    Tripunitara, Mahesh
    Wang, Qihua
    Winsborough, William H.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (04) : 242 - 255