skip to main content
10.1145/1229285.1229315acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Direct static enforcement of high-level security policies

Published:20 March 2007Publication History

ABSTRACT

A high-level security policy states an overall safety requirement for a sensitive task. One example of a high-level security policy is a separation of duty policy, which requires a sensitive task to be performed by a team of at least k users. Recently, Li and Wang [6] proposed an algebra for specifying a wide range of high-level security policies with both qualification and quantity requirements on users who perform a task. In this paper, we study the problem of direct static enforcement of high-level security policies expressed in this algebra. We formally define the notion of a static safety policy, which requires that every set of users together having all permissions needed to complete a sensitive task must contain a subset that satisfies the corresponding security requirement expressed as a term in the algebra. The static safety checking problem asks whether an access control state satisfies a given high-level policy. We study several computational problems related to the static safety checking problem, and design and evaluate an algorithm for solving the problem.

References

  1. D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184--194. IEEE Computer Society Press, May 1987.Google ScholarGoogle ScholarCross RefCross Ref
  2. S. Foley, L. Gong, and X. Qian. A security model of dynamic labeling providing a tiered approach to verification. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 142--153, May 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. S. N. Foley. The specification and implementation of 'commercial' security requirements including dynamic segregation of duties. In Proc. ACM Conference on Computer and Communications Security (CCS), pages 125--134, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. R. Garey and D. J. Johnson. Computers And Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company, 1979. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Li, Z. Bizri, and M. V. Tripunitara. On mutually-exclusive roles and separation of duty. In Proc. ACM Conference on Computer and Communications Security (CCS), pages 42--51. ACM Press, Oct. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Li and Q. Wang. Beyond separation of duty: An algebra for specifying high-level security policies. In Proc. ACM Conference on Computer and Communications Security (CCS), Nov. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. M. J. Nash and K. R. Poland. Some conundrums concerning separation of duty. In Proceedings of IEEE Symposium on Research in Security and Privacy, pages 201--209, May 1990.Google ScholarGoogle ScholarCross RefCross Ref
  8. C. H. Papadimitrou and K. Steiglitz. Combinatorial Optimization. Prentice Hall, 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278--1308, September 1975.Google ScholarGoogle Scholar
  10. R. Sandhu. Separation of duties in computerized information systems. In Proceedings of the IFIP WG11.3 Workshop on Database Security, Sept. 1990.Google ScholarGoogle Scholar
  11. R. S. Sandhu. Transaction control expressions for separation of duties. In Proceedings of the Fourth Annual Computer Security Applications Conference (ACSAC'88), Dec. 1988.Google ScholarGoogle ScholarCross RefCross Ref
  12. J. A. Solworth. Approvability. In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 231--242. ACM Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Q. Wang and N. Li. Direct static enforcement of high-level security policies. Technical Report CERIAS-TR-2006-40, Center for Education and Research in Information Assurance and Security, Purdue University, Dec. 2006.Google ScholarGoogle Scholar

Index Terms

  1. Direct static enforcement of high-level security policies

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
        March 2007
        323 pages
        ISBN:1595935746
        DOI:10.1145/1229285

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 March 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        ASIACCS '07 Paper Acceptance Rate33of180submissions,18%Overall Acceptance Rate418of2,322submissions,18%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader