Specification and verification of access control policies in EB3SEC: work in progress

  • Authors:
  • Pierre Konopacki;Hakim Belhaouari;Marc Frappier;Régine Laleau

  • Affiliations:
  • GRIL, Département d'informatique, Université de Sherbrooke, Canada and Université Paris-Est, LACL, IUT Sénart Fontainebleau, Fontainebleau, France;Université Paris-Est, LACL, IUT Sénart Fontainebleau, Fontainebleau, France;GRIL, Département d'informatique, Université de Sherbrooke, Canada;Université Paris-Est, LACL, IUT Sénart Fontainebleau, Fontainebleau, France

  • Venue:
  • FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Information systems are widely used and help in the management of huge quantities of data. Generally, these data are valuable or sensitive, their access must be restricted to granted users. Security is a mandatory requirement for information systems. Several methods already exist to express access control policies, but few of them, like eb3sec, support all kinds of constraints that can be defined in access control policies. In this paper, we present how to use eb3sec to express two kinds of access control constraints : permissions and prohibitions. Once, constraints are expressed, we provide algorithms to verify that the model of the policy do not lead to deadlock.