We explain how a parameterized model checking technique can be exploited to mechanize the analysis of access control policies. The main advantage of the approach is to reason regardless of the number of users of the system in which the policy is enforced. This permits to obtain more useful results from the analysis; for instance, ensuring that sensitive permissions cannot be leaked regardless of the number of users in the system. We also briefly discuss how some heuristics make the technique scalable to handle (very) large policies. This is demonstrated by a comparative experimental evaluation with state-of-the-art tools for the analysis of access control policies
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
Abstract—A policy-based access control architecture com-prises Policy Enforcement Points (PEPs), whi...
Trust management is a scalable form of access control that relies heavily on delegation. Different p...
Trust management is a scalable form of access control that relies heavily on delegation. Different p...
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated secu...
Access Control is becoming increasingly important for today ubiquitous systems. Sophisticated securi...
Abstract. The administration of access control policies is a task of paramount importance for distri...
Verifying that access-control systems maintain desired security properties is recognized as an impor...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
International audienceWe present a model-based approach to testing access control requirements. By u...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
Abstract—A policy-based access control architecture com-prises Policy Enforcement Points (PEPs), whi...
Trust management is a scalable form of access control that relies heavily on delegation. Different p...
Trust management is a scalable form of access control that relies heavily on delegation. Different p...
Access Control is becoming increasingly important for today's ubiquitous systems. Sophisticated secu...
Access Control is becoming increasingly important for today ubiquitous systems. Sophisticated securi...
Abstract. The administration of access control policies is a task of paramount importance for distri...
Verifying that access-control systems maintain desired security properties is recognized as an impor...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
International audienceWe present a model-based approach to testing access control requirements. By u...
The last years have seen the definition of many languages, models and standards tailored to specify ...
The last years have seen the definition of many languages, models and standards tailored to specify ...
Abstract—A policy-based access control architecture com-prises Policy Enforcement Points (PEPs), whi...