Rewrite Based Specification of Access Control Policies - Inria - Institut national de recherche en sciences et technologies du numérique Access content directly
Conference Papers Year : 2009

Rewrite Based Specification of Access Control Policies

Abstract

Data protection within information systems is one of the main concerns in computer systems security and different access control policies can be used to specify the access requests that should be granted or denied. These access control mechanisms should guarantee that information can be accessed only by authorized users and thus prevent all information leakage. We propose a methodology for specifying and implementing access control policies using the rewrite based framework Tom. This approach allows us to check that any reachable state obtained following an access granted in the implementation satisfies the policy specification. We show that when security levels are not totally ordered some information leakage can be detected.
No file

Dates and versions

inria-00335091 , version 1 (28-10-2008)

Identifiers

  • HAL Id : inria-00335091 , version 1

Cite

Horatiu Cirstea, Pierre-Etienne Moreau, Anderson Santana de Oliveira. Rewrite Based Specification of Access Control Policies. 3rd International Workshop on Security and Rewriting Techniques - SecReT 2008, Jun 2008, Pittsburgh, United States. pp.37-54. ⟨inria-00335091⟩
93 View
0 Download

Share

Gmail Facebook X LinkedIn More