期刊文献+

隐私安全策略中的变更影响分析

Change impact analysis in authorization policies
下载PDF
导出
摘要 为了解决Web分布式系统中的隐私安全策略在制定和变更中的错误很难被发现的问题,提出了策略变更中各种情况的相应变更影响分析算法。对以可扩展访问控制标记语言(XACML)为代表的隐私安全策略语言中的变更理论进行了研究,定义了变更分析中的相关概念,通过把策略中的字符串元素转化成对应整数值建立一个优化的树形数据结构,利用树的特征分析变更后果。这使得一个管理员可以在正式应用策略变更前检验即将实施的变更是否符合自己的真正意图,从而大大增强系统安全性。最后实现了一个原型系统,并可以应用到其他标准策略语言。 Due to the lack of tools for analyzing policies, most authorization policies on the Internet have been plagued with policy errors. A policy error either creates security vulnerabilities that will compromise the security of information technology system. A major source of policy errors stems from policy changes. Authorization policies often need to be changed as networks evolve and new requests emerge. The theory and algorithms for authorization policy change-impact analysis were presented. Algorithms in this paper took an authorization policy and a proposed change as input, and then output the accurate impact of the change. Thus, an administrator can verify a proposed change before committing it. A prototype was built to demonstrate the use of the algorithms.
出处 《计算机应用》 CSCD 北大核心 2011年第1期115-117,共3页 journal of Computer Applications
基金 国家863计划项目(2009AA01Z4222)
关键词 可扩展访问控制标记语言 隐私安全策略 变更影响分析 树形结构 eXtcnsible Access Control Markup Language (XACML) authorization policy change impact analysis tree structure
  • 相关文献

参考文献6

  • 1ANDERSON A. A comparison of two privacy policy languages: EPAL and XACML[ C]// Proceedings of the 3rd ACM Workshop on Secure Web Services. New York: ACM, 2006:53 -60.
  • 2王雅哲,冯登国.一种XACML规则冲突及冗余分析方法[J].计算机学报,2009,32(3):516-530. 被引量:33
  • 3PIETRO M, BRUNO C, SWAMINATHAN S, et al. XACML policy integration algorithms[J]. ACM Transactions on Information and System Security, 2008, 11 (1) : 1 - 29.
  • 4RYDER B, TIP F. Change impact analysis for object-oriented programs[ C]// Proceedings of the 2001 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering. New York: ACM, 2001:46 -53.
  • 5LIU A, CHEN F, HWANG J, et aL Xengine: A fast and scalable XACML policy evaluation engine [ C]// Proceedings of the 2008 ACM SIGMETRICS Intemational Conference on Measurement and Modeling of Computer Systems. New York: ACM, 2008:265 -276.
  • 6LIU A, GOUDA M. Complete redundancy detection in firewalls [C]//Proceedings of the 19th Annual IFIP Conference on Data and Applications Security. Berlin: Springer-Verlag, 2005:196 - 209.

二级参考文献20

  • 1Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management, 1994, 2(4) :333-360.
  • 2Moses T. eXtensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
  • 3Jajodia S, Samarati P, Subrahmanian V S et al. A unified framework for enforcing multiple access control policies// Proceedings of the ACM SIGMOD International Conference on Management of Data. Tucson, Arizona, USA, 1997, 26 (2) : 474-485.
  • 4Jajodia S, Samarati P, Subrahmanian V S. A logical language for expressing authorizations//Proeeedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:31-42.
  • 5Lupu E, Sloman M. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 1999, 25(6): 852-869.
  • 6Cholvy L, Cuppens F. Analyzing consistency of security policies//Proceedings of the 1997 IEEE Symposium on Security and Privacy. Los Alamitos, California, USA, 1997:103-112.
  • 7Dunlop N, Indulska J, Raymond K. Dynamic conflict detection in policy-based management systems//Proceedings of the 6th International Enterprise Distributed Object ComputingConference (EDOC). Lausanne, Switzerland, 2002:15-26.
  • 8Guelev D P, Ryan M, Schobbens P Y. Modei-checking access control policies. Lecture Notes in Computer Science 3225. Berlin: Springer-Verlag, 2004.. 219-230.
  • 9Zhang N, Ryan M, Guelev D P. Synthesising verified access control systems in XACML//Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering. Washington,DC, USA, 2004:56-65.
  • 10Zhang N, Ryan M, Guelev D P. Evaluating access control policies through model checking//Proceedings of the 8th In- formation Security Conference (ISC). Lecture Notes in Computer Science 3650. Berlin: Springer-Verlag, 2005.. 446-460.

共引文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部