Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1998441.1998471acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
research-article

Validation of security policies by the animation of Z specifications

Published: 15 June 2011 Publication History

Abstract

Designing a security policy for an information system is a non-trivial task. In this paper, we consider the design of a security policy based on a variant of the RBAC model, close to SecureUML. This variant includes constraints for the separation of duty, as well as contextual constraints. Contextual constraints use information about the state of the functional model of the application to grant permissions to users. These constraints add flexibility to the security policy, but make its validation more difficult. In this paper, we first review two tools, USE and SecureMOVA, which can be used to analyse and validate a security policy. These tools focus on analyses of static aspects of the secured system. We then propose a new tool, based on the Z formal language, which uses animation of the specification to validate the static as well as dynamic aspects of the security policy, taking into account possible evolutions of the state of the functional model. We discuss how the security policy and the functional application are described to the tool, and what kind of queries and animations can be performed to analyse nominal and malicious behaviours of the system.

References

[1]
J. Abrial. The B-Book. Cambridge Univ. Press, 1996.
[2]
F. Autrel, F. Cuppens, N. Cuppens-Boulahia, and C. Coma-Brebel. MotOrBAC 2: a security policy tool. In SARSSI'08 : 3e conf. Sécurité des Architectures Réseaux et des Systèmes d'Information, 2008.
[3]
D. A. Basin, M. Clavel, J. Doser, and M. Egea. Automated analysis of security-design models. Inf. & Softw. Technology, 51(5):815--831, 2009.
[4]
D. A. Basin, J. Doser, and T. Lodderstedt. Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol., 15(1):39--91, 2006.
[5]
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symp. on Security and Privacy, 1987.
[6]
S. Dupuy, Y. Ledru, and M. Chabre-Peccoud. An Overview of RoZ: A Tool for Integrating UML and Z Specifications. In Proc. 12th Conf. on Advanced information Systems Engineering (CAiSE '00), pages 417--430. LNCS, Vol. 1789, Springer, 2000.
[7]
D. Ferraiolo, D. Kuhn, and R. Chandramouli. Role-Based Access Control. Computer Security Series. Artech House, 2003.
[8]
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for Role-based Access Control. In ACM Transactions on Information and System Security (TISSEC'-01), pages 224--274, 2001.
[9]
M. Gogolla, F. Büttner, and M. Richters. USE: A UML-based specification environment for validating UML and OCL. Science of Computer Programming, 69(1--3):27--34, 2007.
[10]
ISO. Information technology -- Z formal specification notation -- Syntax, type system and semantics, 2002.
[11]
D. Jackson. Software Abstractions: logic, language and analysis. MIT Press, 2006.
[12]
J. Jürjens. Secure Systems Development with UML. Springer, 2004.
[13]
Y. Ledru. Using Jaza to Animate RoZ Specifications of UML Class Diagrams. In Proc. 30th Annual IEEE/NASA Software Engineering Workshop (SEW-30 2006). IEEE CS Press, 2006.
[14]
M. Leuschel and M. J. Butler. ProB: an automated analysis toolset for the B method. Software Tools for Technology Transfer, 10(2):185--203, 2008.
[15]
K. Sohr, M. Drouineaud, G.-J. Ahn, and M. Gogolla. Analyzing and managing role-based access control policies. IEEE Trans. Knowl. Data Eng., 20(7):924--939, 2008.
[16]
M. Toahchoodee, I. Ray, K. Anastasakis, G. Georg, and B. Bordbar. Ensuring spatio-temporal access control for real-world applications. In SACMAT 2009, 14th ACM Symp. on Access Control Models and Technologies. ACM, 2009.
[17]
M. Utting. Jaza User Manual and Tutorial, 2005. http://www.cs.waikato.ac.nz/ marku/jaza/.
[18]
J. B. Warmer and A. G. Kleppe. The Object Constraint Language: Precise Modeling With UML. Addison-Wesley, October 1998.

Cited By

View all
  • (2018)Model-based analysis of Java EE web security misconfigurationsComputer Languages, Systems and Structures10.1016/j.cl.2017.02.00149:C(36-61)Online publication date: 20-Dec-2018
  • (2016)Model-based analysis of Java EE web security configurationsProceedings of the 8th International Workshop on Modeling in Software Engineering10.1145/2896982.2896986(55-61)Online publication date: 14-May-2016
  • (2015)Validation of IS Security Policies Featuring Authorisation ConstraintsInternational Journal of Information System Modeling and Design10.4018/ijismd.20150101026:1(24-46)Online publication date: Jan-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SACMAT '11: Proceedings of the 16th ACM symposium on Access control models and technologies
June 2011
196 pages
ISBN:9781450306881
DOI:10.1145/1998441
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 15 June 2011

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. RBAC
  2. SecureUML
  3. Z formal specification
  4. animation
  5. security policy
  6. validation

Qualifiers

  • Research-article

Conference

SACMAT '11
Sponsor:

Acceptance Rates

Overall Acceptance Rate 177 of 597 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 15 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2018)Model-based analysis of Java EE web security misconfigurationsComputer Languages, Systems and Structures10.1016/j.cl.2017.02.00149:C(36-61)Online publication date: 20-Dec-2018
  • (2016)Model-based analysis of Java EE web security configurationsProceedings of the 8th International Workshop on Modeling in Software Engineering10.1145/2896982.2896986(55-61)Online publication date: 14-May-2016
  • (2015)Validation of IS Security Policies Featuring Authorisation ConstraintsInternational Journal of Information System Modeling and Design10.4018/ijismd.20150101026:1(24-46)Online publication date: Jan-2015
  • (2015)Symbolic Search of Insider Attack Scenarios from a Formal Information System ModelingTransactions on Petri Nets and Other Models of Concurrency X - Volume 941010.1007/978-3-662-48650-4_7(131-152)Online publication date: 1-Jul-2015
  • (2013)The SPaCIoS ProjectProceedings of the 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation10.1109/ICST.2013.75(497-498)Online publication date: 18-Mar-2013
  • (2013)Automated Reviewing of Healthcare Security PoliciesFoundations of Health Information Engineering and Systems10.1007/978-3-642-39088-3_12(176-193)Online publication date: 2013
  • (2011)Validation of security-design models using ZProceedings of the 13th international conference on Formal methods and software engineering10.5555/2075089.2075113(259-274)Online publication date: 26-Oct-2011
  • (2011)A Survey on Access Control DeploymentSecurity Technology10.1007/978-3-642-27189-2_2(11-20)Online publication date: 2011

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media