2015 IEEE 28th Computer Security Foundations Symposium 2015
DOI: 10.1109/csf.2015.10
|View full text |Cite
|
Sign up to set email alerts
|

Compositional Typed Analysis of ARBAC Policies

Abstract: Model-checking is a popular approach to the security analysis of ARBAC policies, but its effectiveness is hindered by the exponential explosion of the ways in which different users can be assigned to different role combinations. In this paper we propose a paradigm shift, based on the observation that, while verifying ARBAC by exhaustive state search is complex, realistic policies often have rather simple security proofs, and we propose to use types as an effective tool to leverage this simplicity. Concretely, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Calzavara et al [33] continue this line of research by proposing a security type system for verifying information flow in ARBAC policies. In particular, their type system can address the role reachability problem and offers a compositional technique.…”
Section: Related Workmentioning
confidence: 99%
“…Calzavara et al [33] continue this line of research by proposing a security type system for verifying information flow in ARBAC policies. In particular, their type system can address the role reachability problem and offers a compositional technique.…”
Section: Related Workmentioning
confidence: 99%
“…There is a long line of works on the safety analysis of access control policies that started with the seminal paper [17]. To the best of our knowledge, Li and Tripunitara [23] were the first to introduce security analysis in the context of ARBAC, followed by many papers, e.g., [21,3,38,24,39,6,1,7,18,15,31,28,44,10]. The idea underlying such works is to reduce safety analysis to graph manipulation [21,3,38] or fix-point computation performed either by Logic Programming (as in [24]) or model checking (as in [39,6,1,7,18,15,31,28,44]).…”
Section: Related Workmentioning
confidence: 99%