AAL and Static Conflict Detection in Policy

作者: Jean-Claude Royer , Anderson Santana De Oliveira

DOI: 10.1007/978-3-319-48965-0_22

关键词:

摘要: Security and privacy requirements in ubiquitous systems need a sophisticated policy language with features to express access restrictions obligations. Ubiquitous involve multiple actors owning sensitive data concerning aspects such as location, discrete continuous time, roles that can be shared among or evolve over time. Policy consistency is an important problem languages supporting these aspects. In this paper we present abstract (AAL) specify most of security compare it XACML. We also classified the existing conflict detection mechanisms for XACML dynamic, testing, static detection. A thorough analysis reveals they have several weaknesses are not applicable our context. advocate classic approach using notion logical detect conflicts AAL.

参考文章(26)
Rémi Delmas, Thomas Polacsek, Formal Methods for Exchange Policy Specification Notes on Numerical Fluid Mechanics and Multidisciplinary Design. pp. 288- 303 ,(2013) , 10.1007/978-3-642-38709-8_19
Viktor Schuppan, Luthfi Darmawan, Evaluating LTL satisfiability solvers automated technology for verification and analysis. pp. 397- 413 ,(2011) , 10.1007/978-3-642-24372-1_28
Kaniz Fatema, David Chadwick, Resolving Policy Conflicts - Integrating Policies from Multiple Authors Lecture Notes in Business Information Processing. pp. 310- 321 ,(2014) , 10.1007/978-3-319-07869-4_29
Kamel Adi, Yacine Bouzida, Ikhlass Hattak, Luigi Logrippo, Serge Mankovskii, Typing for Conflict Detection in Access Control Policies International Conference on E-Technologies. ,vol. 26, pp. 212- 226 ,(2009) , 10.1007/978-3-642-01187-0_17
Michel St-Martin, Amy P. Felty, A verified algorithm for detecting conflicts in XACML access control rules certified programs and proofs. pp. 166- 175 ,(2016) , 10.1145/2854065.2854079
Michel Ludwig, Ullrich Hustadt, Implementing a fair monodic temporal logic prover Ai Communications. ,vol. 23, pp. 69- 96 ,(2010) , 10.3233/AIC-2010-0457
Zhifeng Xiao, Nandhakumar Kathiresshan, Yang Xiao, A survey of accountability in computer networks and distributed systems Security and Communication Networks. ,vol. 9, pp. 290- 315 ,(2016) , 10.1002/SEC.574
Jooyoung Lee, Douglas R. Stinson, On the Construction of Practical Key Predistribution Schemes for Distributed Sensor Networks Using Combinatorial Designs ACM Transactions on Information and System Security. ,vol. 11, pp. 1- 35 ,(2008) , 10.1145/1330332.1330333
Avishai Wool, Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese IEEE Internet Computing. ,vol. 14, pp. 58- 65 ,(2010) , 10.1109/MIC.2010.29
Xiaofeng Xia, A Conflict Detection Approach for XACML Policies on Hierarchical Resources ieee international conference on green computing and communications. pp. 755- 760 ,(2012) , 10.1109/GREENCOM.2012.124