Analyzing XACML policies using answer set programming

被引:0
|
作者
Mohsen Rezvani
David Rajaratnam
Aleksandar Ignjatovic
Maurice Pagnucco
Sanjay Jha
机构
[1] Shahrood University of Technology,Faculty of Computer Engineering
[2] University of New South Wales,School of Computer Science and Engineering
关键词
XACML; Policy analysis; Anomaly detection; Answer set programming;
D O I
暂无
中图分类号
学科分类号
摘要
With the tremendous growth of Web applications and services, eXtensible Access Control Markup Language (XACML) has been broadly adopted to specify Web access control policies. However, when the policies are large or defined by multiple authorities, it has proved difficult to analyze errors and vulnerabilities in a manual fashion. Recent advances in the answer set programming (ASP) paradigm have provided a powerful problem-solving formalism that is capable of dealing with policy verification. In this paper, we employ ASP to analyze various properties of XACML policies. To this end, we first propose a structured mechanism to translate a XACML policy into an ASP program. Then, we leverage the features of off-the-shelf ASP solvers to specify and verify a wide range of properties of a XACML policy, including redundancy, conflicts, refinement, completeness, reachability, and usefulness. We present an empirical evaluation of the effectiveness and efficiency of a policy analysis tool implemented on top of the Clingo ASP solver. The evaluation results show that our approach is computationally more efficient compared with existing approaches.
引用
收藏
页码:465 / 479
页数:14
相关论文
共 50 条
  • [1] Analyzing XACML policies using answer set programming
    Rezvani, Mohsen
    Rajaratnam, David
    Ignjatovic, Aleksandar
    Pagnucco, Maurice
    Jha, Sanjay
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (04) : 465 - 479
  • [2] Analyzing Security Scenarios Using Defence Trees and Answer Set Programming
    Bistarelli, Stefano
    Peretti, Pamela
    Trubitsyna, Irina
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2008, 197 (02) : 121 - 129
  • [3] Reasoning about Security Policies of Services using Answer Set Programming
    Asuncion, Vernon
    Khan, Khaled M.
    Erradi, Abdelkarim
    Alhazbi, Saleh
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 857 - 858
  • [4] Modeling adaptive access control policies using answer set programming
    Sartoli, Sara
    Namin, Akbar Siami
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 44 : 49 - 63
  • [5] Analyzing Semantics of Aggregate Answer Set Programming Using Approximation Fixpoint Theory
    Vanbesien, Linde
    Bruynooghe, Maurice
    Denecker, Marc
    [J]. THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2022, 22 (04) : 523 - 537
  • [6] Using criticalities as a heuristic for answer set programming
    Sabuncu, O
    Alpaslan, FN
    Akman, V
    [J]. LOGIC PROGRAMMING AND NONMONOTONIC REASONING, PROCEEDINGS, 2004, 2923 : 234 - 246
  • [7] Role mining using answer set programming
    Ye, Wei
    Li, Ruixuan
    Gu, Xiwu
    Li, Yuhua
    Wen, Kunmei
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 336 - 343
  • [8] Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming
    Asuncion, Vernon
    Khan, Khaled M.
    Erradi, Abdelkarim
    Alhazbi, Saleh
    [J]. INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2016, 25 (01)
  • [9] Explainable Planning Using Answer Set Programming
    Van Nguyen
    Vasileiou, Stylianos Loukas
    Son, Tran Cao
    Yeoh, William
    [J]. KR2020: PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PRINCIPLES OF KNOWLEDGE REPRESENTATION AND REASONING, 2020, : 662 - 666
  • [10] Answer Set Programming
    Marek, Victor W.
    [J]. THEORY AND PRACTICE OF LOGIC PROGRAMMING, 2020, 20 (03) : 432 - 434