Towards run-time verification in access control

5Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The notion of "session" created a considerable debate in access control. Recent research demonstrated that many access control constraints can not be verified statically at design time. The user behavior during an active session is uncertain, sessions are concurrent and some authorization decision parameters (i.e. conditions) are only available at runtime. However, similarly to what is done in software verification, it is possible to give static indications about the run-tim behavior of the access control system, by analyzing a finite number of approximations that model both the user behavior and the decision parameters. Moreover, constraints (e.g. history-based ones) can be analyzed in combination rather than individually. In this paper, we present a framework tailored to the verification of run-time constraints and security properties (e.g. mutually exclusive roles) for role based access control systems. Our framework employs actors to mimic active entities at runtime and creates stochastic activity entropies from a set of permission and role activations. A security administrator can obtain a set of run-time trajectories with a finite number of simulations that can be used to verify the desired properties. © 2011 IEEE.

Cite

CITATION STYLE

APA

Turkmen, F., Jung, E., & Crispo, B. (2011). Towards run-time verification in access control. In Proceedings - 2011 IEEE International Symposium on Policies for Distributed Systems and Networks, POLICY 2011 (pp. 25–32). https://doi.org/10.1109/POLICY.2011.49

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free