首页> 外文会议>International Conference on Enterprise Information Systems and Web Technologies >Security Assurance for the Attribute-Based Access Control Systems
【24h】

Security Assurance for the Attribute-Based Access Control Systems

机译:基于属性的访问控制系统的安全保障

获取原文

摘要

Recent operating systems govern a composition of information resources, security providing components, and interactions between them. Complexity of security and variety of its control settings takes us to a problem of security assurance. IT-security-related standards force us to prove safety of the system configurations. Searching for vulnerability in the system configuration plays a central role in information protection and intrusion prevention, for an undetected defect may be exploited to compromise every confidential data. However, so far none systematic way has been proposed to detect configuration vulnerabilities besides checking whether the fixed characteristics (file versions, updates, permissions etc) meet the security templates. In this paper, we suggest and discuss a new technique of security assurance applicable to the attribute-based access control. We propose to summarize all access factors that take part in the access control and convert them all to a Set of Available Permissions (SAP), i.e. the access rights that user really obtains in the system. SAP calculation supplies us with knowledge on exact set of available access rights and those access factors that break the due security restrictions. On the sample of MS Windows we demonstrate a formal verification procedure that solves the security assurance problem pointed above - using it we can answer whether a given system configuration fulfills the security requirements. An advantage of our mechanism is that it can be realized as automatic procedure for every kind of systems and security rules.
机译:最近的操作系统管理信息资源的组成,提供安全组件以及它们之间的交互。安全性和各种控制设置的复杂性将我们带到安全保障问题。与安全相关的标准责任我们证明系统配置的安全性。在系统配置中搜索漏洞在信息保护和入侵防护中扮演核心作用,对于未检测到的缺陷,可以利用每个机密数据损害。但是,除了检查固定特性(文件版本,更新,权限等)是否满足安全模板,还建议迄今为止,已建议检测配置漏洞。在本文中,我们建议并讨论适用于基于属性的访问控制的安全保证技术。我们建议总结参加访问控制的所有访问因素,并将其全部转换为一组可用的权限(SAP),即用户在系统中获得的访问权限。 SAP Callulation为我们提供了关于确切可用访问权限的知识以及打破适当安全限制的那些访问因子。在MS Windows的样本上,我们演示了一个正式的验证程序,解决了上面指出的安全保证问题 - 使用它可以回答给定的系统配置是否满足安全要求。我们的机制的一个优点是它可以实现为各种系统和安全规则的自动过程。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号