Verification and enforcement of access control policies

  • Authors:
  • Antonio Cau;Helge Janicke;Ben Moszkowski

  • Affiliations:
  • Software Technology Research Laboratory, De Montfort University, Leicester, UK LE1 9BH;Software Technology Research Laboratory, De Montfort University, Leicester, UK LE1 9BH;Software Technology Research Laboratory, De Montfort University, Leicester, UK LE1 9BH

  • Venue:
  • Formal Methods in System Design
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Access control mechanisms protect critical resources of systems from unauthorized access. In a policy-based management approach, administrators define user privileges as rules that determine the conditions and the extent of users' access rights. As rules become more complex, analytical skills are required to identify conflicts and interactions within the rules that comprise a system policy--especially when rules are stateful and depend on event histories. Without adequate tool support such an analysis is error-prone and expensive. In consequence, many policy specifications are inconsistent or conflicting that render the system insecure. The security of the system, however, does not only depend on the correct specification of the security policy, but in a large part also on the correct interpretation of those rules by the system's enforcement mechanism.In this paper, we show how policy rules can be formalized in Fusion Logic, a temporal logic for the specification of behavior of systems. A symbolic decision procedure for Fusion Logic based on Binary Decision Diagrams (BDDs) is provided and we introduce a novel technique for the construction of enforcement mechanisms of access control policy rules that uses a BDD encoded enforcement automaton based on input traces which reflect state changes in the system. We provide examples of verification of policy rules, such as absence of conflicts, and dynamic separation of duty and of the enforcement of policies using our prototype implementation (FLCheck) for which we detail the underlying theory.