Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering 2004
DOI: 10.1145/1029133.1029141
|View full text |Cite
|
Sign up to set email alerts
|

Synthesising verified access control systems in XACML

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
30
0

Year Published

2005
2005
2011
2011

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 37 publications
(30 citation statements)
references
References 5 publications
0
30
0
Order By: Relevance
“…Fisler et al [14] developed a tool called Margrave that uses multi-terminal binary decision diagrams [9] to verify user-specified properties and perform change-impact analysis. Zhang et al [29] developed a model-checking algorithm and tool support to evaluate access control policies written in RW languages, which can be converted to XACML [28]. Given an XACML policy and generic properties, our proposed approach conducts conformance checking statically by automatically synthesizing concrete properties for static policy verification (based on Margrave [14]).…”
Section: Related Workmentioning
confidence: 99%
“…Fisler et al [14] developed a tool called Margrave that uses multi-terminal binary decision diagrams [9] to verify user-specified properties and perform change-impact analysis. Zhang et al [29] developed a model-checking algorithm and tool support to evaluate access control policies written in RW languages, which can be converted to XACML [28]. Given an XACML policy and generic properties, our proposed approach conducts conformance checking statically by automatically synthesizing concrete properties for static policy verification (based on Margrave [14]).…”
Section: Related Workmentioning
confidence: 99%
“…We have applied the coverage-measurement tool on the whole set of the XACML committee specification conformance test suite [6] and a conference paper review system's policy and its requests developed by Zhang et al [41]. The XACML conformance test suite includes 337 distinct policies 4 , 374 requests, their expected responses from the application of the policies.…”
Section: Empirical Study Of Manually Generated Requests' Policy Coveragementioning
confidence: 99%
“…The conference paper review system's policy specified by Zhang et al [41] has 11 requests and 15 rules, which have 10 conditions. These 10 conditions involve the execution of SQL statements that access an external database.…”
Section: Empirical Study Of Manually Generated Requests' Policy Coveragementioning
confidence: 99%
“…As demonstrated by many authors, formal methods have a role to play in this area, with examples including the work of [8] and [9]-both of which are concerned with the modelling and analysis of XACML. Even when the requirements for an access control policy are well understood, it is still possible for mistakes to be made: the flexibility of policy languages increases the potential for mistakes due, in part, to their expressiveness.…”
Section: Introductionmentioning
confidence: 99%