首页> 外文会议>ACM symposium on Access control models and technologies >Managing access control complexity using metrices
【24h】

Managing access control complexity using metrices

机译:使用矩阵管理访问控制复杂性

获取原文

摘要

General access control models enable flexible expression of access control policies, but they make the verification of whether a particular access control configuration is safe (i.e., prevents the leakage of a permission to an unauthorized subject) difficult. The current approach to expressing safety policy in such models is to use constraints. When the constraints are verified, then the configuration is verified to be safe. However, the addition of constraints to an access control configuration significantly increases its complexity, so it quickly becomes difficult to understand the access control policy expressed in the configuration such that future changes can be made correctly. We propose an approach whereby the complexity of each access control configuration is estimated, so the administrators can see the effect of a configuration change on the future ability to maintain the configuration. We identify metrics for making complexity estimates and evaluate these metrics on some constraint examples. Our goal is to enable the use of flexible access control models for safety-critical systems by permitting limited use of constraints that do not complicate the configuration beyond a maintainable complexity.

机译:

通用访问控制模型可以灵活表达访问控制策略,但是很难验证特定访问控制配置是否安全(即,防止将权限泄露给未经授权的主体)。在这种模型中表达安全策略的当前方法是使用约束。验证约束后,将验证配置是否安全。但是,将限制添加到访问控制配置中会大大增加其复杂性,因此迅速变得难以理解配置中表达的访问控制策略,从而无法正确进行将来的更改。我们提出一种估计每个访问控制配置的复杂性的方法,以便管理员可以看到配置更改对将来维护该配置的能力的影响。我们确定用于进行复杂性估算的指标,并在一些约束示例中评估这些指标。我们的目标是允许对安全性至关重要的系统使用灵活的访问控制模型,方法是允许限制使用约束,这些约束不会使配置复杂化,而无法保持复杂性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号