On Properties of Policy-Based Specifications

被引:3
|
作者
Margheri, Andrea [1 ,2 ]
Pugliese, Rosario [1 ]
Tiezzi, Francesco [3 ]
机构
[1] Univ Florence, I-50121 Florence, Italy
[2] Univ Pisa, I-56100 Pisa, Italy
[3] Univ Camerino, I-62032 Camerino, Italy
关键词
D O I
10.4204/EPTCS.188.5
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The advent of large-scale, complex computing systems has dramatically increased the difficulties of securing accesses to systems' resources. To ensure confidentiality and integrity, the exploitation of access control mechanisms has thus become a crucial issue in the design of modern computing systems. Among the different access control approaches proposed in the last decades, the policy-based one permits to capture, by resorting to the concept of attribute, all systems' security-relevant information and to be, at the same time, sufficiently flexible and expressive to represent the other approaches. In this paper, we move a step further to understand the effectiveness of policy-based specifications by studying how they permit to enforce traditional security properties. To support system designers in developing and maintaining policy-based specifications, we formalise also some relevant properties regarding the structure of policies. By means of a case study from the banking domain, we present real instances of such properties and outline an approach towards their automatised verification.
引用
收藏
页码:33 / 50
页数:18
相关论文
共 50 条
  • [1] Policy-Based Signatures
    Bellare, Mihir
    Fuchsbauer, Georg
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 520 - 537
  • [2] Policy-based networking
    Chadha, R
    Lapiotis, G
    Wright, S
    IEEE NETWORK, 2002, 16 (02): : 8 - 9
  • [3] Policy-based network management
    Pujolle, G
    ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2004, 59 (1-2): : 2 - 9
  • [4] Policy-Based Sanitizable Signatures
    Samelin, Kai
    Slamanig, Daniel
    TOPICS IN CRYPTOLOGY, CT-RSA 2020, 2020, 12006 : 538 - 563
  • [5] Policy-based cryptography and applications
    Bagga, W
    Molva, R
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2005, 3570 : 72 - 87
  • [6] Partnerships in policy-based lending
    Watt, P
    Conditionality Revisited: Concepts, Experiences, and Lessons, 2005, : 249 - 252
  • [7] Hierarchical policy-based replication
    Doherty, Cormac J.
    Hurley, Neil J.
    2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 254 - +
  • [8] Policy-based cognitive radios
    Wilkins, David
    Denker, Grit
    Stehr, Mark-Oliver
    Elenius, Daniel
    Senanayake, Rukman
    Talcott, Carolyn
    IEEE WIRELESS COMMUNICATIONS, 2007, 14 (04) : 41 - 46
  • [9] Policy-based Behavior Control
    Lin Zhi
    Wang Jing
    Jia Lian-xing
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4498 - +
  • [10] Policy-Based Blockchain Selection
    Scheid, Eder John
    Rodrigues, Bruno
    Stiller, Burkhard
    IEEE COMMUNICATIONS MAGAZINE, 2021, 59 (10) : 48 - 54