Efficient automated security analysis of complex authorization policies
➤ Gửi thông báo lỗi ⚠️ Báo cáo tài liệu vi phạmNội dung chi tiết: Efficient automated security analysis of complex authorization policies
Efficient automated security analysis of complex authorization policies
PhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An Efficient automated security analysis of complex authorization policies nalysis ofComplex Authorization PoliciesAnh Tuan ThiongAdvisors:Dr. Silvio Ranise and Prof. Alessandro ArmandoSecurity and Trust Unit, FBK-lrst, Trento, Italia42064Committee Members:Professor Pier angola Samarat iDepartment of Computer Science, University of Milano, Italia pier angola. samara I unii Efficient automated security analysis of complex authorization policies ni. i IProfessor Luca ViganòDepartment of Informatics, King's College London. United Kingdom luca. vigano 0 kcl.ac.ukProfessor Armando TacchcllaDIBRISEfficient automated security analysis of complex authorization policies
Department, University of Genoa, Italia armando.t accholla Ọ unige.itAbstract-4cces.s- Control is becoming increasingly important for today's ubiquitPhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An Efficient automated security analysis of complex authorization policies onsequence, designers need to understand such policies and. ensure that they meet the desired security constraints while administrators must also maintain them so as to comply with the evolving needs of systems and applications. These tasks are greatly complicated by the expressiveness and the dimen Efficient automated security analysis of complex authorization policies sions of the authorization policies. It is thus necessary to provide policy designers and administrators with automated analysis techniques that are cEfficient automated security analysis of complex authorization policies
apable to foresee if. and under what conditions, security properties may be violated. For example, some analysis techniques have already been proposedPhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An Efficient automated security analysis of complex authorization policies orld applications. Although ỈỈBAC simplifies the design and management of policies, -modifications of RBAC policies in complex organizations are difficult and error prone activities due to the limited expressiveness of the basic RBAC model. For this reason, RBAC has been extended in several directio Efficient automated security analysis of complex authorization policies ns to accommodate various needs arising in the real world such as Admimstrotive RBAC (ARBAC) and Temporal RBAC (TRBAC).This Dissertation presents ourEfficient automated security analysis of complex authorization policies
research efforts to find the best trade-offhttps://khothuvien.conibetween scalability and expressiveness for the design and benchmarking of analysis tPhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security An Efficient automated security analysis of complex authorization policies able techniques and then describe our approach that is based, on recently developed symbolic model checking techniques based on Satisfiability Modulo Theories (SMT) solving (for expressiveness) and carefully tuned heuristics (for scalability). Particularly, we present the implementation of the techn Efficient automated security analysis of complex authorization policies iques on the automated analysis of ABB AC and ATBBAC policies and discuss extensive experiments that show that the proposed approach is superior to otEfficient automated security analysis of complex authorization policies
her state-of-the-art analysis techniques. Finally, we discuss directions for extensions.KeywordsAccess Control, Administration, Temporal Access ControPhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security AnPhD DissertationInternational Doctorate School in Information and Communication TechnologiesDISI - University of TrentoEfficient Automated Security AnGọi ngay
Chat zalo
Facebook