2022
DOI: 10.1016/j.jss.2021.111109
|View full text |Cite
|
Sign up to set email alerts
|

Automated reverse engineering of role-based access control policies of web applications

Abstract: Access control (AC) is an important security mechanism used in software systems to restrict access to sensitive resources. Therefore, it is essential to validate the correctness of AC implementations with respect to policy specifications or intended access rights. However, in practice, AC policy specifications are often missing or poorly documented; in some cases, AC policies are hard-coded in business logic implementations. This leads to difficulties in validating the correctness of policy implementations and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…We also introduce a new approach to analyze the presence of heterogeneous access control policies in RAMHAC by modeling the policies with Datalog facts and using the μz tool. The management model includes a wide range of management relationships, commands, antecedent constraints, and postecedent constraints.Le et al in [4] proposed a semi-automated reverse engineering access control policy framework for learning and recovering role-based access control (RBAC) policies from web applications to verify the correctness of implemented policies and detect access control issues. The framework is based on a set of security tools that automatically explore a given Web application, mine domain input specifications from access logs, and use combinatorial test generation to systematically generate and execute additional access requests.Spanaki et al [5] proposed the concept of Data Sharing Agreements (DSAs) as an important path and template for AI applications for data management between parties.…”
Section: Access Control Policies and Modelsmentioning
confidence: 99%
“…We also introduce a new approach to analyze the presence of heterogeneous access control policies in RAMHAC by modeling the policies with Datalog facts and using the μz tool. The management model includes a wide range of management relationships, commands, antecedent constraints, and postecedent constraints.Le et al in [4] proposed a semi-automated reverse engineering access control policy framework for learning and recovering role-based access control (RBAC) policies from web applications to verify the correctness of implemented policies and detect access control issues. The framework is based on a set of security tools that automatically explore a given Web application, mine domain input specifications from access logs, and use combinatorial test generation to systematically generate and execute additional access requests.Spanaki et al [5] proposed the concept of Data Sharing Agreements (DSAs) as an important path and template for AI applications for data management between parties.…”
Section: Access Control Policies and Modelsmentioning
confidence: 99%
“…The integration spanned four key domains: new student admissions, academics, finance, and human resources. A notable feature of this system is the implementation of role-based access control (RBAC) [1] with Single Sign-On (SSO) capabilities, enhancing security and efficiency.…”
Section: Introductionmentioning
confidence: 99%