the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer ...
详细信息
ISBN:
(纸本)9781450329392
the relevance of graphical functions in vehicular applications has increased significantly during the few last years. Modern cars are equipped with multiple displays used by different applications such as speedometer or navigation system. However, so far applications are restricted to using dedicated displays. In order to increase flexibility, the requirement of sharing displays between applications has emerged. Sharing displays leads to safety and security concerns since safety-critical applications as the dashboard warning lights share the same displays with uncritical or untrusted applications like the navigation system or third-party applications. To guarantee the safe and secure sharing of displays, we present a formal model for defining and controlling the access to display areas in this paper. We prove the validity of this model, and present a proof-of-concept
Processes need a variety of resources from their operating environment in order to run properly, but adversary may controlthe inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabi...
详细信息
ISBN:
(纸本)9781450329392
Processes need a variety of resources from their operating environment in order to run properly, but adversary may controlthe inputs to resource retrieval or the end resource itself, leading to a variety of vulnerabilities. Conventional accesscontrol methods are not suitable to prevent such vulnerabilities because they use one set of permissions for all system call invocations. In this paper, we define a novel policy model for describing when resource retrievals are unsafe, so they can be blocked. this model highlights two contributions: (1) the explicit definition of adversary models as adversarial roles, which list the permissions that dictate whether one subject is an adversary of another, and (2) the application of data-flow to determine the adversary control of the names used to retrieve resources. An evaluation using multiple adversary models shows that data-flow is necessary to authorize resource retrieval in over 90% of system calls. By making adversary models and the adversary accessibility of all aspects of resource retrieval explicit, we can block resource access attacks system-wide.
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal fr...
详细信息
ISBN:
(纸本)9781450375689
Data aggregation operations are popular in domains like data analytics, machine learning and artificial intelligence. However, despite the availability of information, situations like fragmented ownership and legal frameworks hinder data processing, requiring companies to design complex human-driven processes in order to gather, aggregate, and process data in a compliant way. Our proposal addresses this lack of automation with an accesscontrol mechanism extending XacmL, an accesscontrol standard with language and implementation, to regulate operations with multiple data policies.
Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for many applicatio...
详细信息
ISBN:
(纸本)9781450329392
Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for many applications, and that what should determine authorization is the relationships that exist between entities in the system. While recent research has considered the possibility of specifying authorization policies based on the relationships that exist between peers in social networks, we are not aware of the application of these ideas to general computing systems. We develop a formal accesscontrol model that makes use of ideas from relationship-based accesscontrol and a two-stage method for evaluating policies. Our policies are defined using path conditions, which are similar to regular expressions. We define semantics for path conditions, which we use to develop a rigorous method for evaluating policies. We describe the algorithm required to evaluate policies and establish its complexity. Finally, we illustrate the advantages of our model using an example and describe a preliminary implementation of our algorithm.
Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing accesscontrolmodels however captures this reciprocity phenomenon. In t...
详细信息
ISBN:
(纸本)9781450367530
Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing accesscontrolmodels however captures this reciprocity phenomenon. In this paper, we introduce a new kind of grant, which we call mutual, to express authorizations that actually do this, i.e., users grant access to their resources only to users who allow them access to theirs. We define the syntax and semantics of mutual authorizations and show how this new grant can be included in the Role-Based accesscontrol model, i.e., extend RBAC with it.
the CAP theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it...
详细信息
ISBN:
(纸本)9781450375689
the CAP theorem is used by distributed system practitioners to investigate the necessary trade-offs in the design and development of distributed systems, mainly databases and web applications. In this paper, we use it to reason about accesscontrol systems designed for the Internet of things (IoT). We validate our approach by experimentally investigating alternative architectural designs to enforce accesscontrol in a smart lock system using the cloud-edge IoT platform offered by Amazon Web Services. We discuss the trade-off between security and performance that may help IoT designers choose the most suitable architecture supporting their requirements.
To date, most work regarding the formal analysis of accesscontrol schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property th...
详细信息
ISBN:
(纸本)9781450329392
To date, most work regarding the formal analysis of accesscontrol schemes has focused on quantifying and comparing the expressive power of a set of schemes. Although expressive power is important, it is a property that exists in an absolute sense, detached from the application context within which an accesscontrol scheme will ultimately be deployed. By contrast, we formalize the accesscontrol suitability analysis problem, which seeks to evaluate the degree to which a set of candidate accesscontrol schemes can meet the needs of an application-specific workload. this process involves both reductions to assess whether a scheme is capable of implementing a workload (qualitative analysis), as well as cost analysis using ordered measures to quantify the overheads of using each candidate scheme to service the workload (quantitative analysis). We formalize the two-facet suitability analysis problem, which formally describes this task. We then develop a mathematical framework for this type of analysis, and evaluate this framework both formally, by quantifying its efficiency and accuracy properties, and practically, by exploring an academic program committee workload.
Understanding accesscontrol policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced accesscontrol policy in a system is no...
详细信息
ISBN:
(纸本)9781450375689
Understanding accesscontrol policies is essential in understanding the security behavior of systems. However, often times, a complete and accurate specification of the enforced accesscontrol policy in a system is not available. In fact, scale and complexity of a system, or unavailability of its source code, may prevent users and even its developers from having access to such accurate specification. In this paper, we propose a novel, systematic approach for learning accesscontrol policies where target systems are treated as black boxes. In particular, we show how we can construct a deterministic finite automaton (DFA) characterizing the relationship-based accesscontrol (ReBAC) policy of a system by interacting with its accesscontrol engine using minimal number of access requests. Our experiments on realistic application scenarios and their promising results demonstrate the feasibility, scalability and efficiency of our learning approach.
A plethora of Relationship-Based accesscontrol (ReBAC) models have been proposed, varying in the types of policies they can express. this fragmentation has stifled the creation of a benchmark to directly compare the ...
详细信息
ISBN:
(纸本)9781450393577
A plethora of Relationship-Based accesscontrol (ReBAC) models have been proposed, varying in the types of policies they can express. this fragmentation has stifled the creation of a benchmark to directly compare the performance of ReBAC systems based on their common supported policies. To solve this problem, we propose RACON, a schema-driven, customisable ReBAC policy generator. RACON generates policies in an intermediate language subsuming the features required to encode existing ReBAC models. this language can subsequently be translated to popular ReBAC policy languages through an extensible translation module. Taking a view of ReBAC policies as graph queries, we implement translations into two popular graph query languages, namely Cypher and SPARQL.
暂无评论