Model-based security engineering uses formal security models for specifying and analyzing accesscontrol systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world access ...
详细信息
ISBN:
(纸本)9781450319508
Model-based security engineering uses formal security models for specifying and analyzing accesscontrol systems. Tool-based model analysis encounters a fundamental difficulty here: on the one hand, real-world accesscontrol systems generally are quite large and complex and require modelsthat have high expressive power. On the other hand, analysis of such models is often pestered by computational complexity or even non-decidability, making it difficult to devise algorithms for automated analysis tools. One approach to this problem is to limiting the expressive power of the modeling calculus, resulting in restrictions to the spectrum of application scenarios that can be modeled. In this paper we propose a different approach: a heuristic-based method for analyzing the safety properties of accesscontrolmodels with full expressive power. Aiming at generality, the paper focuses on the lineage of HRU-style, automaton-based accesscontrolmodelsthat are fundamental for modeling the dynamic behavior of contemporary role-based or attribute-based accesscontrol systems. the paper motivates a heuristics-based approach to model analysis, describes in detail a heuristic model safety analysis algorithm, and discusses its computational complexity. the algorithm is the core of a security model analysis tool within the context of a security policy engineering workbench;a formal description of major components of its heuristic-based symbolic model execution engine is given, and its capacity to analyze complex real-world accesscontrol systems is evaluated. Copyright 2013 acm.
Benchmarking is the comparison of one company's key performance indicators (KPI) to the statistics of the same KPIs of its peer group. A KPI is a statistical quantity measuring the performance of a business proces...
详细信息
Relying on an accesscontrol security policy alone to protect valuable resources is a dangerous practice. Prudent security must engage in other risk management and mitigation techniques to rapidly detect and recover f...
详细信息
ISBN:
(纸本)9781450319508
Relying on an accesscontrol security policy alone to protect valuable resources is a dangerous practice. Prudent security must engage in other risk management and mitigation techniques to rapidly detect and recover from breaches. In reality, many security policies are either wrong, containing errors, or are misused and abused by malicious employees or compromised accounts;not all granted access is desirable. A popular approach to mitigate against these and other residual threats is to monitor applications to detect misuse and abuse of credentials in near real-time. We will show a platform for monitoring applications and the use of analytic models on diverse datasets for detecting suspicious user activity. Our platform combines traditional data management systems with BigData platforms to efficiently apply analytics across security relevant data (policies, logs, metadata) and provide administrators a dashboard of the current security status of the organization, and the ability to investigate prioritized alerts. One key analytic in the demo is a novel generalization of the role mining problem as applied to access logs and modeling user behavior for anomalies. Other analytics include conventional statistical measures, Gaussian mixture models and clustering, Markov models, and entropic analysis of requests. this demonstration will walk through a prototype system and describe the analytics and underlying architecture. Copyright 2013 acm.
In the smart city projects that will "smartize" urban infrastructures, a new accesscontrol technology is needed to offer appropriate consumer data to appropriate applications. In this paper, we analyze char...
详细信息
ISBN:
(纸本)9789897581281
In the smart city projects that will "smartize" urban infrastructures, a new accesscontrol technology is needed to offer appropriate consumer data to appropriate applications. In this paper, we analyze characteristics and problems of the data access in the service platform for smart public infrastructure and clarify requirements for data accesscontrol. Next, we propose a data model and a data accesscontrol method that satisfy those requirements. the data model includes access authorization that expresses the contracts between consumer and service provider. In the data accesscontrol method, data corresponding to the access authorization is filtered in RDBMS for the performance. Finally, we evaluate the proposed method by implementing a prototype and confirm that the requirements are satisfied.
Mobile devices consume significant amounts of information, from different sources. thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant...
详细信息
ISBN:
(纸本)9781450319508
Mobile devices consume significant amounts of information, from different sources. thus they often deal also with sensitive or confidential data, in places or situations that could be not appropriate, or not compliant with a corporate policy: context-aware access/usage control solutions can counter such situations. We propose a prototype, called ProtectMe, that exploits "Sticky Policies"(SP) that are attached to resources and prescribe usage conditions. Since mobile devices cannot foresee usage conditions of collected data, ProtectMe integrates SPs within any information consumable by mobile devices, and dynamically enforces their usage constraints. It assists users in attaching access and usage control conditions stated by resource-specific SPs, and it enforces them by making use of contextual information collected by mobile devices. the aim of the prototype is to show the feasibility of the SP approach, merging security functionalities within a concept for expressing SPs in a user-friendly manner. Copyright 2013 acm.
Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evalua...
详细信息
ISBN:
(纸本)9781450319508
Although the declarative nature of SQL provides great utility to database users, its use in distributed database management systems can result in unintended consequences to user privacy over the course of query evaluation. By allowing users to merely say what data they are interested in accessing without providing guidance regarding how to retrieve it, query optimizers can generate plans that leak sensitive query intension. To address these types of issues, we have created a framework that empowers users withthe ability to specify accesscontrols on the intension of their queries through extensions to the SQL SELECT statement. In this demonstration, we present a version of PostgreSQL's query optimizer that we have modified to produce plans that respect these constraints while optimizing user-specified SQL queries in terms of performance. Copyright 2013 acm.
the successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted u...
详细信息
ISBN:
(纸本)9781450319508
the successful operation of NATO missions requires effective and secure sharing of information among coalition partners and external organizations, while avoiding the disclosure of sensitive information to untrusted users. To resolve the conflict between confidentiality and availability, NATO is developing a new information sharing infrastructure, called Content-based Protection and Release. We describe the architecture of accesscontrol in NATO operations, which is designed to be easily built on top of available (service-oriented) infrastructures for identity and accesscontrol management. We then present a use case scenario drawn from the NATO Passive Missile Defence system for simulating the consequences of intercepting missile attacks. In the system demonstration, we show how maps annotated withthe findings of the system are filtered by the accesscontrol module to produce appropriate views for users with different clearances and terminals under given release and protection policies. Copyright 2013 acm.
Recently, the importance of including obligations as part of accesscontrol systems for privilege management, for example, in healthcare information systems, has been well recognized. In an accesscontrol system, an a...
详细信息
ISBN:
(纸本)9781450319508
Recently, the importance of including obligations as part of accesscontrol systems for privilege management, for example, in healthcare information systems, has been well recognized. In an accesscontrol system, an a posteriori obligation states which actions need to be performed by a user after he has accessed a resource. there is no guarantee that a user will fulfill a posteriori obligations. Not fulfilling these obligations may incur financial loss, or loss of goodwill and productivity to the organization. In this paper, we propose a trust-and-obligation based framework that reduces the risk exposure of an organization associated with a posteriori obligations. We propose a methodology to assign trust values to users to indicate how trustworthy they are with regards to fulfilling their obligations. When access requests that trigger a posteriori obligations are evaluated, the requesting users' trust values and the criticality of the associated obligations are used. Our framework detects and mitigates insider attacks and unintentional damages that may result from violating a posteriori obligations. Our framework also provides mechanisms to determine misconfigurations of obligation policies. We evaluate our framework through simulations and demonstrate its effectiveness. Copyright 2013 acm.
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for accesscontrol policies: applications to role mining over logs wi...
ISBN:
(纸本)9781450312950
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for accesscontrol policies: applications to role mining over logs with attribution;SCUTA: a server-side accesscontrol system for web applications;optimal workflow-aware authorizations;accesscontrol for RDF graphs using abstract models;a cloud-based RDF policy engine for assured information sharing;SecureBPMN: modeling and enforcing accesscontrol requirements in business processes;encryption-enforced accesscontrol for an RFID discovery service;automating architectural security analysis;a trust-and-risk aware RBAC framework: tackling insider threat;analyzing temporal role based accesscontrolmodels;a framework integrating attribute-based policies into role-based accesscontrol;and a framework for verification and optimal reconfiguration of event-driven role based accesscontrol policies.
the evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may incr...
详细信息
ISBN:
(纸本)9781450319508
the evolution of information systems sees an increasing need of flexible and sophisticated approaches for the automated detection of anomalies in security policies. One of these anomalies is redundancy, which may increase the total cost of management of the policies and may reduce the performance of accesscontrol mechanisms and of other anomaly detection techniques. We consider three approaches that can remove redundancy from accesscontrol policies, progressively reducing the number of authorizations in the policy itself. We show that several problems associated with redundancy are NP-hard. We propose exact solutions to two of these problems, namely the Minimum Policy Problem, which consists in computing the minimum policy that represents the behaviour of the system, and the Minimum Irreducible Policy Problem, consisting in computing the redundancy-free version of a policy withthe smallest number of authorizations. Furthermore we propose heuristic solutions to those problems. We also present a comparison between the exact and heuristics solutions based on experiments that use policies derived from bibliographical databases. Copyright 2013 acm.
暂无评论