KHO THƯ VIỆN 🔎

Efficient automated security analysis of complex authorization policies

➤  Gửi thông báo lỗi    ⚠️ Báo cáo tài liệu vi phạm

Loại tài liệu:     PDF
Số trang:         200 Trang
Tài liệu:           ✅  ĐÃ ĐƯỢC PHÊ DUYỆT
 











Nội dung chi tiết: Efficient automated security analysis of complex authorization policies

Efficient automated security analysis of complex authorization policies

PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An

Efficient automated security analysis of complex authorization policies nalysis ofComplex Authorization PoliciesAnh Tuan ThiongAdvisors:Dr. Silvio Ranise and Prof. Alessandro ArmandoSecurity and Trust Unit, FBK-lrst, Trent

o, Italia42064Committee Members:Professor Pier angola Samarat iDepartment of Computer Science, University of Milano, Italia pier angola. samara I unii Efficient automated security analysis of complex authorization policies

ni. i IProfessor Luca ViganòDepartment of Informatics, King's College London. United Kingdom luca. vigano 0 kcl.ac.ukProfessor Armando TacchcllaDIBRIS

Efficient automated security analysis of complex authorization policies

Department, University of Genoa, Italia armando.t accholla Ọ unige.itAbstract-4cces.s- Control is becoming increasingly important for today's ubiquit

PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An

Efficient automated security analysis of complex authorization policies onsequence, designers need to understand such policies and. ensure that they meet the desired security constraints while administrators must also main

tain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimen Efficient automated security analysis of complex authorization policies

sions of the authorization policies. It is thus necessary to provide policy designers and administrators with automated analysis techniques that are c

Efficient automated security analysis of complex authorization policies

apable to foresee if. and under what conditions, security properties may be violated. For example, some analysis techniques have already been proposed

PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An

Efficient automated security analysis of complex authorization policies orld applications. Although ỈỈBAC simplifies the design and management of policies, -modifications of RBAC policies in complex organizations are diffi

cult and error prone activities due to the limited expressiveness of the basic RBAC model. For this reason, RBAC has been extended in several directio Efficient automated security analysis of complex authorization policies

ns to accommodate various needs arising in the real world such as Admimstrotive RBAC (ARBAC) and Temporal RBAC (TRBAC).This Dissertation presents our

Efficient automated security analysis of complex authorization policies

research efforts to find the best trade-offhttps://khothuvien.conibetween scalability and expressiveness for the design and benchmarking of analysis t

PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An

Efficient automated security analysis of complex authorization policies able techniques and then describe our approach that is based, on recently developed symbolic model checking techniques based on Satisfiability Modulo

Theories (SMT) solving (for expressiveness) and carefully tuned heuristics (for scalability). Particularly, we present the implementation of the techn Efficient automated security analysis of complex authorization policies

iques on the automated analysis of ABB AC and ATBBAC policies and discuss extensive experiments that show that the proposed approach is superior to ot

Efficient automated security analysis of complex authorization policies

her state-of-the-art analysis techniques. Finally, we discuss directions for extensions.KeywordsAccess Control, Administration, Temporal Access Contro

PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An

PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An

Gọi ngay
Chat zalo
Facebook