Publication | Open Access
Reconfiguring Role Based Access Control policies using risk semantics
35
Citations
18
References
2006
Year
EngineeringInformation SecurityFormal VerificationRisk MeasureHardware SecuritySecurity ModellingLogical Access ControlAccess ControlAccess Control PoliciesSystems EngineeringComputer EngineeringData PrivacyComputer ScienceRefined ModelData SecurityCryptographyCloud ComputingSecuritySystem SoftwareComputer Security ModelModel-driven Security
We present a refined model for Role Based Access Control policies and define a risk measure for the model, which expresses elements of the operational, combinatorial and conflict of interest risks present in a particular policy instance. The model includes risk-reducing mechanisms corresponding to practical mechanisms like firewalls, stack checking, redundancy, and event tracking that are frequently used to reduce risks in real systems. We also define policy transformation operators that produce new policies that allow the behaviours of the old policy while potentially reducing the risk measure. Sequences of these operators can be used to find policies that are less risky but still implement the initial policy. An example is give for Grid computing.
| Year | Citations | |
|---|---|---|
Page 1
Page 1