首页> 外文会议>5th annual workshop on cyber security and information intelligence research 2009 >Security policy testing via automated program code generation
【24h】

Security policy testing via automated program code generation

机译:通过自动程序代码生成进行安全策略测试

获取原文

摘要

Access control is one of the fundamental security mechanisms for information systems. It determines the availability of resources to principals, operations that can be performed, and under what circumstances. Traditionally the enforcement of access control is often hardcoded in applications or systems; such hardcoding makes it hard to verify the correctness of access control and to accommodate changes of security requirements. Recently, access control policies have been increasingly separated from enforcement mechanisms. An access control policy is explicitly specified using certain policy languages with well-defined syntax and semantics. An application then consults the policy during runtime to determine whether an access request from a principal should be allowed or denied. There are two main advantages of this approach. First, security officers can now perform systematic and formal security analysis on access control policies. Second, by separating policies from enforcement mechanisms, it ispossible to change policies without affecting the underlying mechanisms, and vice versa.
机译:访问控制是信息系统的基本安全机制之一。它决定了对校长的资源的可用性,可以执行的操作,以及在什么情况下。传统上,访问控制的执行通常在应用程序或系统中进行硬编码;这种硬编码使得难以验证访问控制的正确性并适应安全要求的变化。最近,访问控制策略越来越多地与执法机制分开。使用具有明确定义的语法和语义的某些策略语言明确指定访问控制策略。然后,应用程序在运行时查阅策略以确定是否应允许或拒绝从校长中获取访问请求。这种方法有两个主要优点。首先,安全人员现在可以对访问控制策略进行系统和正式的安全分析。其次,通过将政策与执法机制分开,可以在不影响潜在机制的情况下改变政策,反之亦然。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号