Automatic conformance checking of role-based access control policies via alloy

  • Authors:
  • David Power;Mark Slaymaker;Andrew Simpson

  • Affiliations:
  • Oxford University Computing Laboratory, Oxford, United Kingdom;Oxford University Computing Laboratory, Oxford, United Kingdom;Oxford University Computing Laboratory, Oxford, United Kingdom

  • Venue:
  • ESSoS'11 Proceedings of the Third international conference on Engineering secure software and systems
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Access control policies are a crucial aspect of many security-critical software systems. It is generally accepted that the construction of access control policies is not a straightforward task. Further, any mistakes in the process have the potential to give rise both to security risks, due to the provision of inappropriate access, and to frustration on behalf of legitimate end-users when they are prevented from performing essential tasks. In this paper we describe a tool for constructing role-based access control (RBAC) policies, which are automatically checked for conformance with constraints described using predicate logic. These constraints may represent general healthiness conditions that should hold of all policies conforming to a general model, or capture requirements pertaining to a particular deployment.