Title | Verification of Security Policy Enforcement in Enterprise Systems |
Publication Type | Book |
Year of Publication | 2009 |
Authors | Gupta, Puneet, and Stoller Scott |
Series Title | Emerging Challenges for Security, Privacy and Trust |
Edition | 2009 |
Series Volume | 297 |
Number of Pages | 202-213 |
Publisher | Springer Berlin Heidelberg |
ISBN Number | 978-3-642-01243-3 |
Other Numbers | Online ISBN: 978-3-642-01244-0 |
Abstract | Many security requirements for enterprise systems can be expressed in a natural way as high-level access control policies. A high-level policy may refer to abstract information resources, independent of where the information is stored; it controls both direct and indirect accesses to the information; it may refer to the context of a request, i.e., the request’s path through the system; and its enforcement point and enforcement mechanism may be unspecified. Enforcement of a high-level policy may depend on the system architecture and the configurations of a variety of security mechanisms, such as firewalls, host login permissions, file permissions, DBMS access control, and application-specific security mechanisms. This paper presents a framework in which all of these can be conveniently and formally expressed, a method to verify that a high-level policy is enforced, and an algorithm to determine a trusted computing base for each resource. |
URL | http://link.springer.com/chapter/10.1007%2F978-3-642-01244-0_18 |
DOI | 10.1007/978-3-642-01244-0_18 |