305,535 research outputs found

    Push-based XML access control policy languages: a review

    Get PDF
    Several access control policy languages have been proposed for specifying access control policies for push-based XML access control systems. This paper investigates the scalability of the current XML-based policy languages. It starts by introducing the well-known general access control models with more focus on their scalability. Then, the XML-based policy languages are presented followed by evaluating their management and system scalability. This paper founds that there is a need for using decentralized trusted management concept for addressing the scalability issue in XML access control. Also, using IBE will help in providing several access control features as temporal and delegable access

    A System For Visual Role-Based Policy Modelling

    Get PDF
    The definition of security policies in information systems and programming applications is often accomplished through traditional low level languages that are difficult to use. This is a remarkable drawback if we consider that security policies are often specified and maintained by top level enterprise managers who would probably prefer to use simplified, metaphor oriented policy management tools. To support all the different kinds of users we propose a suite of visual languages to specify access and security policies according to the role based access control (RBAC) model. Moreover, a system implementing the proposed visual languages is proposed. The system provides a set of tools to enable a user to visually edit security policies and to successively translate them into (eXtensible Access Control Markup Language) code, which can be managed by a Policy Based Management System supporting such policy language. The system and the visual approach have been assessed by means of usability studies and of several case studies. The one presented in this paper regards the configuration of access policies for a multimedia content management platform providing video streaming services also accessible through mobile devices

    Access Control from an Intrusion Detection Perspective

    Get PDF
    Access control and intrusion detection are essential components for securing an organization's information assets. In practice, these components are used in isolation, while their fusion would contribute to increase the range and accuracy of both. One approach to accomplish this fusion is the combination of their security policies. This report pursues this approach by defining a comparison framework for policy specification languages and using this to survey the languages Ponder, LGI, SPL and PDL from the perspective of intrusion detection. We identified that, even if an access control language has the necessary ingredients for merging policies, it might not be appropriate due to mismatches in overlapping concepts

    Declarative Policies for Capability Control

    Get PDF
    In capability-safe languages, components can access a resource only if they possess a capability for that resource. As a result, a programmer can prevent an untrusted component from accessing a sensitive resource by ensuring that the component never acquires the corresponding capability. In order to reason about which components may use a sensitive resource it is necessary to reason about how capabilities propagate through a system. This may be difficult, or, in the case of dynamically composed code, impossible to do before running the system. To counter this situation, we propose extensions to capability-safe languages that restrict the use of capabilities according to declarative policies. We introduce two independently useful semantic security policies to regulate capabilities and describe language-based mechanisms that enforce them. Access control policies restrict which components may use a capability and are enforced using higher-order contracts. Integrity policies restrict which components may influence (directly or indirectly) the use of a capability and are enforced using an information-flow type system. Finally, we describe how programmers can dynamically and soundly combine components that enforce access control or integrity policies with components that enforce different policies or even no policy at all.Engineering and Applied Science

    Language Extensions for Specifying Access Control Policies in Programming Languages

    Get PDF
    The scope rules in programming languages control the sharing of data among program units-e.g., blocks and procedures. Typically, scope rules provide an all-or-nothing kind of access control. A wide range of programming problems exist which require finer access control as well as considerable sophistication for the implementation of access control policies on high-level data objects such as files. This paper presents a number of language extensions that permit the programmer to specify the degree of access control for each abstract object that a program unit can manipulate. An attempt has been made to keep the number of extensions as small as possible and yet allow the user conveniently to specify the access control policies that he desires. Some of the extensions permit access policies to be specified such that access correctness can be completely determined at compile time; other extensions permit policies to be specified that require some access checking to be done at runtime in order to ensure access correctness. The extensions have been developed such that subsets can be selected and implemented in programming languages to provide various access control policies

    Modeling and developing access control policies using semantic technologies

    Get PDF
    Policy languages have become the most common way to protect the online resources from unauthorized access. Nowadays, the Sun's XACML has become the most widely used standard for access control, allowing the definition of hierarchical policies and very complex rules. From the idea that semantic technologies could help the definition and execution of access control policies, in this thesis we want to analyze the state of the art of the emerging semantic web technologies, focusing on the semantic approaches to access control, and in case there are any, the approaches whose base stands on XACML
    corecore