首页> 外文会议>Secure data management >On the Construction and Verification of Self-modifying Access Control Policies
【24h】

On the Construction and Verification of Self-modifying Access Control Policies

机译:自修改访问控制策略的构建和验证

获取原文
获取原文并翻译 | 示例

摘要

Typically, access control policies are either static or depend on independently maintained external state to achieve some notion of dynamism. While it is possible to fully verify the properties of static policies, any reference to external state will necessarily limit the scope of such verification. In this paper we explore the feasibility of describing self-modifying policies which contain both rules for granting access and rules for the modification of the policy. Policy level constraints are used to define validity. Using these constraints it becomes possible to verify both the current state of the policy and any possible future states. A working prototype is described which utilises a relational model finder to perform the verification. The prototype is capable of generating instances of failure cases and presenting them via a simple user interface.
机译:通常,访问控制策略是静态的,或者依赖于独立维护的外部状态来实现某些动态概念。尽管可以完全验证静态策略的属性,但是任何对外部状态的引用都必然会限制此类验证的范围。在本文中,我们探讨了描述自我修改策略的可行性,该策略既包含授予访问的规则,又包含修改策略的规则。策略级别约束用于定义有效性。使用这些约束,可以同时验证策略的当前状态和任何可能的未来状态。描述了一个工作原型,该原型利用关系模型查找器进行验证。该原型能够生成故障案例的实例,并通过简单的用户界面将其呈现出来。

著录项

  • 来源
    《Secure data management》|2009年|107-121|共15页
  • 会议地点 Lyon(FR);Lyon(FR)
  • 作者单位

    Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD United Kingdom;

    Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD United Kingdom;

    Oxford University Computing Laboratory Wolfson Building, Parks Road, Oxford OX1 3QD United Kingdom;

  • 会议组织
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类 安全保密;
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号