Automatic conformance checking of role-based access control policies via Alloy

D Power, M Slaymaker, A Simpson�- …�2011, Madrid, Spain, February 9-10�…, 2011 - Springer
D Power, M Slaymaker, A Simpson
Engineering Secure Software and Systems: Third International Symposium, ESSoS�…, 2011Springer
Access control policies are a crucial aspect of many security-critical software systems. It is
generally accepted that the construction of access control policies is not a straightforward
task. Further, any mistakes in the process have the potential to give rise both to security
risks, due to the provision of inappropriate access, and to frustration on behalf of legitimate
end-users when they are prevented from performing essential tasks. In this paper we
describe a tool for constructing role-based access control (RBAC) policies, which are�…
Abstract
Access control policies are a crucial aspect of many security-critical software systems. It is generally accepted that the construction of access control policies is not a straightforward task. Further, any mistakes in the process have the potential to give rise both to security risks, due to the provision of inappropriate access, and to frustration on behalf of legitimate end-users when they are prevented from performing essential tasks. In this paper we describe a tool for constructing role-based access control (RBAC) policies, which are automatically checked for conformance with constraints described using predicate logic. These constraints may represent general healthiness conditions that should hold of all policies conforming to a general model, or capture requirements pertaining to a particular deployment.
Springer
Showing the best result for this search. See all results