Proceedings of the 27th International Conference on Software Engineering - ICSE '05 2005
DOI: 10.1145/1062455.1062502
|View full text |Cite
|
Sign up to set email alerts
|

Verification and change-impact analysis of access-control policies

Abstract: Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not only preventing the leakage of data but also permitting access to necessary information. Indeed, the same datum is often treated differently depending on context.System designers create policies to express conditions on the access to data. To reduce source clutter and improve maintenance, developers increasingly use domain-specific, de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
147
0

Year Published

2005
2005
2015
2015

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 246 publications
(148 citation statements)
references
References 28 publications
1
147
0
Order By: Relevance
“…Such methods are often based on formally specifying system requirements or design, including security aspects, then either generating the system or verifying that the system (or a model of the system) conforms to the specification. Notable examples of this approach include Event-B [44] (in which systems are generated from Event-B specifications); Secure Tropos [45], which extends the Tropos [46] agent-oriented software development method with security-related models and activities; UMLSec [47]; various approaches for specifying and analyzing security protocols, access control policies and other system properties [48,49,50,51,52,53].…”
Section: Related Workmentioning
confidence: 99%
“…Such methods are often based on formally specifying system requirements or design, including security aspects, then either generating the system or verifying that the system (or a model of the system) conforms to the specification. Notable examples of this approach include Event-B [44] (in which systems are generated from Event-B specifications); Secure Tropos [45], which extends the Tropos [46] agent-oriented software development method with security-related models and activities; UMLSec [47]; various approaches for specifying and analyzing security protocols, access control policies and other system properties [48,49,50,51,52,53].…”
Section: Related Workmentioning
confidence: 99%
“…Existing approaches to the policy similarity analysis are mostly based on graph, model checking or SAT-solver techniques [1,3,8,13,16,19]. Koch et al [13] use graph transformations to represent policy change and integration, which may be used to detect differences among policies.…”
Section: Related Work On Policy Analysismentioning
confidence: 99%
“…A more practical approach is by Fisler et al [8], who have developed a software tool known as Margrave for the analysis of role-based access-control policies in XACML. Margrave represents policies using the Multi-Terminal Binary Decision Diagram (MTBDD), which can explicitly represent all variable assignments that satisfy a Boolean expression and hence provides a good representation for the relationships among policies.…”
Section: Related Work On Policy Analysismentioning
confidence: 99%
See 2 more Smart Citations