2013
DOI: 10.1007/978-3-642-40203-6_32
|View full text |Cite
|
Sign up to set email alerts
|

Automated Certification of Authorisation Policy Resistance

Abstract: Attribute-based Access Control (ABAC) extends traditional Access Control by considering an access request as a set of pairs attribute name-value, making it particularly useful in the context of open and distributed systems, where security relevant information can be collected from different sources. However, ABAC enables attribute hiding attacks, allowing an attacker to gain some access by withholding information. In this paper, we first introduce the notion of policy resistance to attribute hiding attacks. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2015
2015

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…For instance, attribute-hiding attacks is studied in [9], and it is shown that hiding an attribute can lead a decisionmaker to permit an access that would have been denied with full knowledge of the environment. Hence, integrating multiple influencers could provide a model characterising the conflicting influences over decision-makers, between security mechanisms and attackers.…”
Section: Resultsmentioning
confidence: 99%
“…For instance, attribute-hiding attacks is studied in [9], and it is shown that hiding an attribute can lead a decisionmaker to permit an access that would have been denied with full knowledge of the environment. Hence, integrating multiple influencers could provide a model characterising the conflicting influences over decision-makers, between security mechanisms and attackers.…”
Section: Resultsmentioning
confidence: 99%
“…Morisset and Griesmeyer showed that it is sufficient to only consider requests comprising attribute name-value pairs that explicitly occur in the PTaCL policy [7]. In particular, it is not necessary to consider (n, v) for every possible value of v that n can take.…”
Section: Abstract Evaluationmentioning
confidence: 98%
“…For instance, we give below the PTaCL definition for the policy p1 defined in Section 2.2, using the syntax of the tool ATRAP [7], where Ptar is the constructor for target policies, Ppov for the operator , Pdov for the operator , Topt for the operator ∼ and Tstrongand for the operator˜ :…”
Section: Target and Policiesmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, for the attribute-based language PTaCL [3] a tool ATRAP was developed in [6] that automatically searches for such attacks and -in their absence -constructs a formal proof of their absence.…”
Section: Usability Issues Of Peal +mentioning
confidence: 99%