Abstract: Access control is one of the building blocks of network security and is often managed by network administrators through the definition of sets of high-level policies meant to regulate network behavior (policy-based management). In this scenario, policy refinement and verification are important processes that have to be dealt with carefully, possibly relaying on computer-aided automated software tools. This paper presents a comprehensive approach for access control policy refinement, verification and, in case errors are detected in the policy implementation, their fixing. The proposed methodology is based on a twofold model able to describe both policies and system configurations and allows, by suitably processing the model, to either propose a system configuration that correctly enforces the policies, or determine whether a specific implementation matches the policy specification also providing hints on how possible anomalies can be fixed. Results on the average complexity of the solution confirm its feasibility in terms of computation time, even for complex networked systems consisting of several hundred nodes.
|Titolo:||A comprehensive approach to the automatic refinement and verification of access control policies|
|Data di pubblicazione:||2019|
|Digital Object Identifier (DOI):||10.1016/j.cose.2018.09.013|
|Appare nelle tipologie:||1.1 Articolo in rivista|
File in questo prodotto: