Security policy analysis using deductive spreadsheets

  • Authors:
  • Anu Singh;C. R. Ramakrishnan;I. V. Ramakrishnan;Scott D. Stoller;David S. Warren

  • Affiliations:
  • Stony Brook University, Stony Brook, NY;Stony Brook University, Stony Brook, NY;Stony Brook University, Stony Brook, NY;Stony Brook University, Stony Brook, NY;Stony Brook University, Stony Brook, NY

  • Venue:
  • Proceedings of the 2007 ACM workshop on Formal methods in security engineering
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

As security policies get larger and more complex, analysis tools that help users understand and validate security policies are becoming more important.This paper explores the use of deductive spreadsheets for security policy analysis.Deductive spreadsheets combine the power ofdeductive rules (for specifying policies and analyses) with the usability of spreadsheets.This approach is introduced with a simple example of analyzing information flow allowed by RBAC policies and then applied in two case studies: analysis of computer system configurations and analysisof Security-Enhanced Linux access control policies.